{"id":422753,"date":"2024-10-20T06:42:45","date_gmt":"2024-10-20T06:42:45","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iec-63173-22022\/"},"modified":"2024-10-26T12:35:09","modified_gmt":"2024-10-26T12:35:09","slug":"bs-iec-63173-22022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iec-63173-22022\/","title":{"rendered":"BS IEC 63173-2:2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | English CONTENTS <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 3 Terms, definitions and abbreviated terms 3.1 Terms and definitions <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 3.2 Abbreviated terms 4 General description of SECOM 4.1 General <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 4.2 Information service interface Figures Figure 1 \u2013 Overview of SECOM <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 4.3 Information security 4.3.1 Measures 4.3.2 SECOM PKI <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 4.3.3 Communication channel security 4.3.4 Data protection Figure 2 \u2013 Secure communication channel <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Figure 3 \u2013 Illustration of what parts of the message are protected by the two signatures <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 4.3.5 Certificate revocation status 4.4 Service discoverability Figure 4 \u2013 Envelope and data validation <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 4.5 Structure of this document 5 SECOM information service interface 5.1 General <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 5.2 How to read descriptions of service interface definition Figure 5 \u2013 Service definition model for the service interface definitions <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 5.3 Service technology and service transportation protocol Tables Table 1 \u2013 Read instructions for tables in service interface definitions <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 5.4 Service interface versioning 5.5 Pagination 5.6 Common information objects and data types 5.6.1 General Table 2 \u2013 SECOM Service interface versioning <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 5.6.2 Basic data types 5.6.3 SECOM_ExchangeMetadataObject Table 3 \u2013 Basic data types <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 5.6.4 Transfer of public key Table 4 \u2013 SECOM_ExchangeMetadataObject Table 5 \u2013 DigitalSignatureValueObject <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Figure 6 \u2013 Example in C# of conversion from PEM format to minified public key Figure 7 \u2013 Example of a public key in PEM format converted to a single line string <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 5.6.5 PaginationObject Figure 8 \u2013 Example in C# of conversion from minified public key to PEM format Figure 9 \u2013 Example of a minified public key string restored to the original PEM format <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 5.6.6 ContainerTypeEnum 5.6.7 SECOM_DataProductType Table 6 \u2013 PaginationObject Table 7 \u2013 ContainerTypeEnum Table 8 \u2013 SECOM_DataProductType <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 5.6.8 SECOM_ResponseCodeEnum 5.6.9 AckRequest Enum Table 9 \u2013 SECOM_ResponseCodeEnum Table 10 \u2013 AckRequest Enum <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 5.6.10 Common HTTP response codes 5.6.11 Well-known text \u2013 WKT Table 11 \u2013 Common HTTP codes Table 12 \u2013 Supported WKT geometric objects <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 5.6.12 Universally Unique Identifier \u2013 UUID Figure 10 \u2013 UUID version and variant Table 13 \u2013 UUID variants <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 5.6.13 UN\/LOCODE 5.7 Service interface definitions 5.7.1 General Table 14 \u2013 UUID versions Table 15 \u2013 Service interfaces overview <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 5.7.2 Service interface \u2013 Upload <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | Figure 11 \u2013 Upload interface UML diagram <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | Table 16 \u2013 Information input for Upload interface <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | Table 17 \u2013 Information output for Upload interface Table 18 \u2013 REST implementation of Upload <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | Table 19 \u2013 HTTP Response codes and message in response object <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | Figure 12 \u2013 Sequence diagram for upload signedunclassified data with acknowledgement <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 5.7.3 Service interface \u2013 Upload Link <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | Figure 13 \u2013 Update link interface UML diagram <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | Table 20 \u2013 Information input for Upload Link interface <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | Table 21 \u2013 Information output for Upload Link interface Table 22 \u2013 REST implementation of Upload Link Table 23 \u2013 HTTP Response codes and message in response object <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 5.7.4 Service interface \u2013 Acknowledgement Figure 14 \u2013 Sequence diagram for Upload link to large data <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | Figure 15 \u2013 Acknowledgement interface UML diagram <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | Table 24 \u2013 Information input for Acknowledgement interface Table 25 \u2013 Enumerations for not acknowledged Table 26 \u2013 Information output for Acknowledgement interface <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | Table 27 \u2013 Enumerations for Acknowledgement interface Table 28 \u2013 REST implementation of acknowledgement <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 5.7.5 Service interface \u2013 Get Figure 16 \u2013 Sequence diagram for Acknowledgement interface Table 29 \u2013 HTTP Response codes and response message <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | Figure 17 \u2013 Get interface UML diagram <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | Table 30 \u2013 Information input for Get interface Table 31 \u2013 Information output for Get interface <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | Table 32 \u2013 REST implementation of Get Table 33 \u2013 HTTP Response code and message of Get <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | Figure 18 \u2013 Sequence diagram for Get interface <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 5.7.6 Service interface \u2013 Get Summary Figure 19 \u2013 Sequence diagram for Get interface and classified data <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | Figure 20 \u2013 Get Summary interface UML diagram Table 34 \u2013 Information input for Get Summary interface <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | Table 35 \u2013 Information output for Get Summary interface <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | Table 36 \u2013 REST implementation of Get Summary Table 37 \u2013 HTTP Response codes and messages of Get Summary <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | 5.7.7 Service interface \u2013 Get By Link Figure 21 \u2013 Sequence diagram for Get Summary interface Figure 22 \u2013 Get By Link interface in UML Table 38 \u2013 Information input for Get By Link interface <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | Table 39 \u2013 Information output for Get By Link interface Table 40 \u2013 REST implementation of Get By Link Table 41 \u2013 HTTP Response code and message of Get By Link <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | 5.7.8 Service interface \u2013 Access Figure 23 \u2013 Sequence diagram for Get By Link interface <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | Figure 24 \u2013 Access interface UML diagram Table 42 \u2013 Information input for Access interface <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | Table 43 \u2013 Information output for Access interface Table 44 \u2013 Enumerations for Access interface Table 45 \u2013 Parameter binding for the operation <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | 5.7.9 Service interface \u2013 Access Notification Figure 25 \u2013 Sequence diagram for Request Access and Access Notification interface Table 46 \u2013 HTTP Response codes <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | Figure 26 \u2013 Access Notification interface UML diagram Table 47 \u2013 Information input for Access Notification interface Table 48 \u2013 Information output for Access Notification interface <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | 5.7.10 Service interface \u2013 Subscription Table 49 \u2013 Parameter binding for the operation Table 50 \u2013 HTTP response codes <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | Figure 27 \u2013 Subscribe interface UML diagram <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | Table 51 \u2013 Information input for Subscription interface Table 52 \u2013 Information output for Subscription interface Table 53 \u2013 REST implementation of Subscription <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | Figure 28 \u2013 Sequence diagram for Subscribe interface Table 54 \u2013 HTTP response codes and messages of Subscription <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | Figure 29 \u2013 Operational sequence diagram for Subscription interfaces <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 5.7.11 Service interface \u2013 Remove Subscription Figure 30 \u2013 Sequence diagram for Subscription interfaceswith external subscription request <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | Figure 31 \u2013 Remove Subscription interface UML diagram Table 55 \u2013 Information input for Remove Subscription interface Table 56 \u2013 Information output for Remove Subscription interface <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | Figure 32 \u2013 Sequence diagram for Remove Subscription interface Table 57 \u2013 REST implementation of Remove Subscription Table 58 \u2013 HTTP Response codes and messages of Remove Subscription <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | 5.7.12 Service interface \u2013 Subscription Notification Figure 33 \u2013 Subscription Notification interface UML diagram Table 59 \u2013 Information input for Subscription Notification interface Table 60 \u2013 Information output for Subscription Notification interface <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | Table 61 \u2013 Enumerations for Subscription Notification interface Table 62 \u2013 Information exchange for Subscription Notification Table 63 \u2013 HTTP response codes for Subscription Notification <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | 5.7.13 Service interface \u2013 Capability Figure 34 \u2013 Sequence diagram for Subscription Notification interface Table 64 \u2013 Capability example <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | Figure 35 \u2013 Capability interface UML diagram <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | Table 65 \u2013 Information output for Capability interface <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | 5.7.14 Service interface \u2013 Ping Figure 36 \u2013 Sequence diagram for Capability interface Table 66 \u2013 REST implementation of Capability Table 67 \u2013 HTTP response codes and messages of Capability <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | Figure 37 \u2013 Ping interface UML diagram Table 68 \u2013 Information output for Ping interface <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | 5.7.15 Service interface \u2013 EncryptionKey Figure 38 \u2013 Check status on service Table 69 \u2013 REST implementation of Ping Table 70 \u2013 HTTP response codes of Ping <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | Figure 39 \u2013 Encryption Key interface UML diagram <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | Table 71 \u2013 Information input for Encryption Key interface Table 72 \u2013 Information input for Encryption Key Notification interface <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | Table 73 \u2013 Information output for Encryption Key interface Table 74 \u2013 REST implementation of EncryptionKey upload Table 75 \u2013 HTTP response codes of EncryptionKey upload <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | Table 76 \u2013 REST implementation of EncryptionKey notification Table 77 \u2013 HTTP response codes of EncryptionKey notification <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | Figure 40 \u2013 Operational sequence diagram for EncryptionKey upload interface <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | 5.7.16 Service interface \u2013 PublicKey Figure 41 \u2013 Operational sequence diagram for EncryptionKey notification interface <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | Figure 42 \u2013 PublicKey interface UML diagram Table 78 \u2013 Information input for PublicKey interface Table 79 \u2013 Information output for PublicKey interface GETand information input for PublicKey interface POST <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | Table 80 \u2013 REST implementation of PublicKey (GET) Table 81 \u2013 HTTP response code and message of PublicKey (GET) <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | Figure 43 \u2013 Operational sequence diagram for PublicKey interface Table 82 \u2013 REST implementation of PublicKey (POST) Table 83 \u2013 HTTP response code and message of PublicKey (POST) <\/td>\n<\/tr>\n | ||||||
98<\/td>\n | 6 SECOM communication channel security 6.1 General 6.2 Secure transfer 6.2.1 Secure communication channel <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | 6.2.2 Authentication procedure 7 SECOM data protection 7.1 General Figure 44 \u2013 Principle for service authentication <\/td>\n<\/tr>\n | ||||||
100<\/td>\n | 7.2 Data compression and packaging 7.3 Data authentication and signing 7.3.1 General 7.3.2 Data formats and standards for digital signatures, keys and certificates <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | 7.3.3 Creation of digital signature <\/td>\n<\/tr>\n | ||||||
102<\/td>\n | 7.3.4 Creation of envelope signature Table 84 \u2013 Conversion rules <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | 7.3.5 Verification of digital signature Table 85 \u2013 Interfaces with envelope signature <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | 7.3.6 Verification of envelope signature 7.3.7 Example of commands for data authentication Table 86 \u2013 Command examples <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | 7.4 Data encryption 7.4.1 General 7.4.2 Encryption algorithm 7.5 Creation and transfer of encryption key 7.5.1 General <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | 7.5.2 SECOM encryption key management Figure 45 \u2013 Sequence for SECOM encryption key management <\/td>\n<\/tr>\n | ||||||
107<\/td>\n | 7.5.3 Generate encryption key 7.5.4 Sign the protected encryption key 7.5.5 Transfer of the encryption key Figure 46 \u2013 Alternative sequence for SECOM encryption key management <\/td>\n<\/tr>\n | ||||||
108<\/td>\n | 7.5.6 Example 8 SECOM PKI 8.1 General Table 87 \u2013 Example of commands <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | 8.2 Scheme 8.2.1 General 8.2.2 Scheme administrator 8.2.3 Data servers 8.2.4 Data clients <\/td>\n<\/tr>\n | ||||||
110<\/td>\n | 8.2.5 Procedure 8.3 Generation of public and private key <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | 8.4 Certificate signing request 8.5 Certificate revocation 8.5.1 General 8.5.2 CRL \u2013 Certificate revocation list 8.5.3 OCSP \u2013 Online certificate status protocol Table 88 \u2013 Creation of public and private key pairs \u2013 Example of basic commands <\/td>\n<\/tr>\n | ||||||
112<\/td>\n | 8.6 SECOM PKI service interface 8.6.1 General 8.6.2 Service interface \u2013 CSR Table 89 \u2013 PKI interface overview <\/td>\n<\/tr>\n | ||||||
113<\/td>\n | Figure 47 \u2013 CSR interface UML diagram Table 90 \u2013 Information input for CSR interface Table 91 \u2013 Information output for CSR interface <\/td>\n<\/tr>\n | ||||||
114<\/td>\n | Figure 48 \u2013 Operational sequence diagram for CSR Table 92 \u2013 REST implementation of CSR Table 93 \u2013 HTTP response codes and message in response object <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | 8.6.3 Service interface \u2013 GetPublicKey Figure 49 \u2013 GetPublicKey interface UML diagram Table 94 \u2013 Information input for GetPublicKey interface Table 95 \u2013 Information output for GetPublicKey interface <\/td>\n<\/tr>\n | ||||||
116<\/td>\n | Table 96 \u2013 REST implementation of GetPublicKey interface Table 97 \u2013 HTTP Response codes and message in response object <\/td>\n<\/tr>\n | ||||||
117<\/td>\n | 8.6.4 Service interface \u2013 CRL Figure 50 \u2013 Operational sequence diagram for GetPublicKey Figure 51 \u2013 GetCRL interface UML diagram <\/td>\n<\/tr>\n | ||||||
118<\/td>\n | 8.6.5 Service interface \u2013 OCSP Figure 52 \u2013 Operational sequence diagram for CRL Table 98 \u2013 REST implementation of CRL Table 99 \u2013 HTTP response codes and message in response object <\/td>\n<\/tr>\n | ||||||
119<\/td>\n | Figure 53 \u2013 GetOCSP interface UML diagram Table 100 \u2013 REST implementation of OCSP <\/td>\n<\/tr>\n | ||||||
120<\/td>\n | Table 101 \u2013 HTTP response codes and message in response object Table 102 \u2013 REST implementation of OCSP Table 103 \u2013 HTTP response codes and message in response object <\/td>\n<\/tr>\n | ||||||
121<\/td>\n | 8.6.6 Service interface \u2013 Revoke Figure 54 \u2013 Operational sequence diagram for OCSP Figure 55 \u2013 PostRevoke interface UML diagram Table 104 \u2013 Information input for Revoke interface <\/td>\n<\/tr>\n | ||||||
122<\/td>\n | Table 105 \u2013 Enumerations for Revoke interface Table 106 \u2013 Information output for Revoke interface Table 107 \u2013 REST implementation of Revoke <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | 9 SECOM service discovery service interface 9.1 General 9.2 Service interface \u2013 Search service 9.2.1 Specification Figure 56 \u2013 Operational sequence diagram for Revoke Table 108 \u2013 HTTP response codes and message in response object <\/td>\n<\/tr>\n | ||||||
124<\/td>\n | 9.2.2 Data exchange model Figure 57 \u2013 Search service UML information diagram <\/td>\n<\/tr>\n | ||||||
125<\/td>\n | Table 109 \u2013 Information input for search service interface Table 110 \u2013 Information input for search parameter object <\/td>\n<\/tr>\n | ||||||
126<\/td>\n | 9.2.3 REST design Table 111 \u2013 Information output for search service interface <\/td>\n<\/tr>\n | ||||||
127<\/td>\n | 10 SECOM error cases 10.1 Error cases Table 112 \u2013 REST implementation for Search Service Table 113 \u2013 HTTP response codes <\/td>\n<\/tr>\n | ||||||
128<\/td>\n | 10.2 General 10.3 Message integrity 10.4 Data integrity 10.5 Transport confidentiality <\/td>\n<\/tr>\n | ||||||
129<\/td>\n | 10.6 Data protection 10.7 Service identity 10.8 Client identity <\/td>\n<\/tr>\n | ||||||
130<\/td>\n | 10.9 Client authorization 10.10 Bandwidth optimization 10.11 Large message transfer <\/td>\n<\/tr>\n | ||||||
131<\/td>\n | 10.12 Closed loop communication <\/td>\n<\/tr>\n | ||||||
132<\/td>\n | 10.13 Service discoverability 10.14 Information push 10.15 Information pull <\/td>\n<\/tr>\n | ||||||
133<\/td>\n | 10.16 Subscribe to data 10.17 Service information 10.18 Service condition <\/td>\n<\/tr>\n | ||||||
134<\/td>\n | 11 Test methods and expected results 11.1 General 11.2 Communication channel security test <\/td>\n<\/tr>\n | ||||||
135<\/td>\n | 11.3 Data protection test 11.3.1 Data Compression and packaging 11.3.2 Data authentication and signature 11.3.3 Encryption 11.3.4 Digital signature test 11.4 SECOM ship\/shore test 11.4.1 General <\/td>\n<\/tr>\n | ||||||
136<\/td>\n | Table 114 \u2013 Test data reference <\/td>\n<\/tr>\n | ||||||
138<\/td>\n | 11.4.2 Prerequisites SECOM ship\/shore EUT 11.4.3 Upload data <\/td>\n<\/tr>\n | ||||||
139<\/td>\n | 11.4.4 Download data Table 115 \u2013 Upload test method steps <\/td>\n<\/tr>\n | ||||||
140<\/td>\n | Table 116 \u2013 Download test method steps <\/td>\n<\/tr>\n | ||||||
141<\/td>\n | 11.5 SECOM Information Service test 11.5.1 General Table 117 \u2013 Test data reference <\/td>\n<\/tr>\n | ||||||
142<\/td>\n | 11.5.2 Prerequisites SECOM information service EUT 11.5.3 Access <\/td>\n<\/tr>\n | ||||||
143<\/td>\n | 11.5.4 Access notification 11.5.5 Acknowledgement Table 118 \u2013 Access test method steps Table 119 \u2013 Access Notification test method steps <\/td>\n<\/tr>\n | ||||||
144<\/td>\n | 11.5.6 Capability Table 120 \u2013 Acknowledgement test method steps Table 121 \u2013 Capability test method steps <\/td>\n<\/tr>\n | ||||||
145<\/td>\n | 11.5.7 EncryptionKey 11.5.8 EncryptionKey Notification Table 122 \u2013 EncryptionKey test method steps <\/td>\n<\/tr>\n | ||||||
146<\/td>\n | 11.5.9 Get Table 123 \u2013 EncryptionKey notification test method steps <\/td>\n<\/tr>\n | ||||||
147<\/td>\n | 11.5.10 Get By Link Table 124 \u2013 Get test method steps <\/td>\n<\/tr>\n | ||||||
148<\/td>\n | 11.5.11 Get Summary Table 125 \u2013 Get By Link test method steps <\/td>\n<\/tr>\n | ||||||
149<\/td>\n | 11.5.12 Get Public Key 11.5.13 Upload Public Key Table 126 \u2013 Get Summary test method steps Table 127 \u2013 Get Public Key test method steps <\/td>\n<\/tr>\n | ||||||
150<\/td>\n | 11.5.14 Ping 11.5.15 Subscription Table 128 \u2013 Upload Public Key test method steps Table 129 \u2013 Ping test method steps <\/td>\n<\/tr>\n | ||||||
151<\/td>\n | 11.5.16 Subscription Notification 11.5.17 Remove Subscription Table 130 \u2013 Subscription test method steps Table 131 \u2013 Subscription Notification test method steps <\/td>\n<\/tr>\n | ||||||
152<\/td>\n | 11.5.18 Upload Table 132 \u2013 Remove Subscription test method steps <\/td>\n<\/tr>\n | ||||||
153<\/td>\n | 11.5.19 Upload Link Table 133 \u2013 Upload test method steps <\/td>\n<\/tr>\n | ||||||
154<\/td>\n | 11.6 SECOM PKI Service test 11.6.1 Prerequisites PKI EUT Table 134 \u2013 Upload Link test method steps <\/td>\n<\/tr>\n | ||||||
155<\/td>\n | 11.6.2 CRL 11.6.3 OCSP Table 135 \u2013 CRL test method steps Table 136 \u2013 OCSP test method steps <\/td>\n<\/tr>\n | ||||||
156<\/td>\n | 11.6.4 Revoke 11.6.5 CSR 11.6.6 GetPublicKey Table 137 \u2013 Revoke test method steps Table 138 \u2013 CSR test method steps <\/td>\n<\/tr>\n | ||||||
157<\/td>\n | 11.7 SECOM Service Discovery test 11.7.1 General 11.7.2 Prerequisites Service Discovery EUT 11.7.3 Search service \u2013 By geometry Table 139 \u2013 GetPublicKey test method steps <\/td>\n<\/tr>\n | ||||||
158<\/td>\n | 11.7.4 Search service \u2013 Without specified search criteria Table 140 \u2013 Search service by geometry test method steps Table 141 \u2013 Search service empty query test method steps <\/td>\n<\/tr>\n | ||||||
159<\/td>\n | Annex A (normative)REST service interface definitions A.1 Purpose A.2 SECOM information service REST interface definition A.3 SECOM PKI service REST interface definition A.4 SECOM discovery service REST interface definition <\/td>\n<\/tr>\n | ||||||
160<\/td>\n | Annex B (informative)Operational use cases and profiles B.1 Purpose B.2 Use cases and service interface profiles B.2.1 UC-1 Ship shares route plan with service providing enhanced monitoring <\/td>\n<\/tr>\n | ||||||
161<\/td>\n | B.2.2 UC-2 Pilot routes Table B.1 \u2013 UC-1 Ship shares route plan with service providing enhanced monitoring <\/td>\n<\/tr>\n | ||||||
162<\/td>\n | B.2.3 UC-3 Route optimization Table B.2 \u2013 Required service interfaces in UC-3 <\/td>\n<\/tr>\n | ||||||
163<\/td>\n | B.2.4 UC-4 Enhanced monitoring service requests route plan from\/for ship for monitoring Table B.3 \u2013 Required service interfaces in UC-3 <\/td>\n<\/tr>\n | ||||||
164<\/td>\n | B.2.5 UC-5 Discover service instance to consume Table B.4 \u2013 Required service interfaces in UC-4 <\/td>\n<\/tr>\n | ||||||
165<\/td>\n | B.2.6 UC-6 Chart (ENC) updates <\/td>\n<\/tr>\n | ||||||
166<\/td>\n | B.2.7 UC-7 navigational warning service Table B.5 \u2013 Required service interfaces in UC-6 <\/td>\n<\/tr>\n | ||||||
167<\/td>\n | Table B.6 \u2013 Required service interfaces in UC-7 <\/td>\n<\/tr>\n | ||||||
168<\/td>\n | B.2.8 UC-8 Updates for detailed bathymetry and tidal and water level forecasts Table B.7 \u2013 Required service interfaces in UC-8 <\/td>\n<\/tr>\n | ||||||
169<\/td>\n | Annex C (informative)Message exchange patterns C.1 Purpose C.2 Message exchange pattern C.2.1 Generic message exchange patterns Figure C.1 \u2013 Message Exchange Pattern \u2013 ONE_WAY <\/td>\n<\/tr>\n | ||||||
170<\/td>\n | Figure C.2 \u2013 Message Exchange Pattern \u2013 REQUEST_CALLBACK Figure C.3 \u2013 Message exchange pattern \u2013 REQUEST_RESPONSE <\/td>\n<\/tr>\n | ||||||
171<\/td>\n | Figure C.4 \u2013 Message exchange pattern \u2013 PUBLISH_SUBSCRIBE (Provider nominates) Figure C.5 \u2013 Message exchange pattern \u2013 PUBLISH_SUBSCRIBE (Consumer request) <\/td>\n<\/tr>\n | ||||||
172<\/td>\n | C.2.2 Alternative and error sequences Figure C.6 \u2013 Error sequence; Incorrect uploaded message Figure C.7 \u2013 Error sequence; Unauthorized upload of message Figure C.8 \u2013 Error sequence; Unauthorized subscription request <\/td>\n<\/tr>\n | ||||||
173<\/td>\n | Annex D (informative)Guidance on implementation D.1 Purpose Figure D.1 \u2013 Overview of SECOM <\/td>\n<\/tr>\n | ||||||
174<\/td>\n | D.2 On ship Figure D.2 \u2013 Overview of certificate usage <\/td>\n<\/tr>\n | ||||||
175<\/td>\n | D.3 On shore Figure D.3 \u2013 Deployment example for SECOM on ship <\/td>\n<\/tr>\n | ||||||
176<\/td>\n | D.4 Service composition Figure D.4 \u2013 Deployment example for SECOM on shore <\/td>\n<\/tr>\n | ||||||
177<\/td>\n | D.5 Private side security Figure D.5 \u2013 Service composition <\/td>\n<\/tr>\n | ||||||
178<\/td>\n | D.6 SECOM PKI D.6.1 General D.6.2 Structure and Functionality Figure D.6 \u2013 Structure of MIR within MCP <\/td>\n<\/tr>\n | ||||||
179<\/td>\n | D.6.3 Identity management <\/td>\n<\/tr>\n | ||||||
182<\/td>\n | D.6.4 Public Key Infrastructure <\/td>\n<\/tr>\n | ||||||
183<\/td>\n | Figure D.7 \u2013 Hierarchical X.509 PKI Structure <\/td>\n<\/tr>\n | ||||||
185<\/td>\n | Table D.1 \u2013 Domain parameters Table D.2 \u2013 Subject distinguished name field items <\/td>\n<\/tr>\n | ||||||
186<\/td>\n | Table D.3 \u2013 Fields and object identifiers <\/td>\n<\/tr>\n | ||||||
187<\/td>\n | D.6.5 Authentication and authorization for web services <\/td>\n<\/tr>\n | ||||||
188<\/td>\n | D.6.6 Profile “Basic Requirements” D.7 SECOM service discovery D.7.1 Example 1: geometry combined with serviceType search Table D.4 \u2013 MCP OpenID Connect token <\/td>\n<\/tr>\n | ||||||
189<\/td>\n | Figure D.8 \u2013 Request find service with geometry and query <\/td>\n<\/tr>\n | ||||||
190<\/td>\n | D.7.2 Example 2: Search with AND\/OR condition Figure D.9 \u2013 Response from service registry <\/td>\n<\/tr>\n | ||||||
191<\/td>\n | Figure D.10 \u2013 Response from service registry <\/td>\n<\/tr>\n | ||||||
192<\/td>\n | Annex E (informative)Use of white list E.1 Purpose E.2 Authorization to access data <\/td>\n<\/tr>\n | ||||||
193<\/td>\n | E.3 Access control list E.4 Authorization based on predefined rules or list <\/td>\n<\/tr>\n | ||||||
194<\/td>\n | E.5 Manually updated list E.6 Rule based handling on request to information (rule based authorization) E.7 Rule based request for information E.8 Procedure when receiving “Not authorized” <\/td>\n<\/tr>\n | ||||||
195<\/td>\n | Annex F (informative)Test and simulators F.1 Purpose F.2 Manual testing F.3 Ship and shore equipment Figure F.1 \u2013 Manual testing <\/td>\n<\/tr>\n | ||||||
196<\/td>\n | F.4 SECOM information service equipment F.5 SECOM PKI equipment Figure F.2 \u2013 Overview of test equipment for ship and shore equipment Figure F.3 \u2013 Overview of test equipment for SECOM information service equipment <\/td>\n<\/tr>\n | ||||||
197<\/td>\n | F.6 SECOM Service Discovery equipment Figure F.4 \u2013 Overview of test equipment for SECOM PKI equipment Figure F.5 \u2013 Overview of test equipment for SECOM service discovery equipment <\/td>\n<\/tr>\n | ||||||
198<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Maritime navigation and radiocommunication equipment and systems \u2013 Data interface – Secure online transfer of S-100 based products applied on S-421 Route Plan<\/b><\/p>\n |