BSI 24/30489445 DC 2024
$13.70
BS EN IEC 63563-9 Qi Specification version 2.0 – Part 9. Authentication Protocol (Fast track)
Published By | Publication Date | Number of Pages |
BSI | 2024 | 93 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | 30489445-NC.pdf |
3 | 100_4130e_CDV.pdf |
8 | 1 General 1.1 Structure of the Qi Specification |
9 | 1.2 Scope 1.3 Compliance 1.4 References |
10 | 1.5 Conventions 1.5.1 Notation of numbers 1.5.2 Tolerances 1.5.3 Fields in a data packet |
11 | 1.5.4 Notation of text strings 1.5.5 Short-hand notation for data packets |
12 | 1.6 Power Profiles |
13 | 2 Overview |
14 | 2.1 References |
16 | 2.2 Cryptographic methods 2.2.1 Random number generators 2.3 Security overview 2.3.1 Methodology 2.3.2 Periodic re-Authentication 2.4 Impact to existing ecosystem |
17 | 2.5 Support for revocation |
18 | 3 Certificates and private keys 3.1 Certificate Chains |
20 | 3.2 Certificates 3.2.1 Format of Certificates 3.2.1.1 Textual format 3.2.1.2 Attributes and Extensions |
22 | 3.2.1.3 Manufacturer CA Certificate |
25 | 3.2.1.4 Product Unit Certificate |
28 | 3.2.1.5 Root CA Certificate |
29 | 3.2.1.6 Additional attributes and extensions 3.2.1.7 Constraints |
30 | 3.3 Certificate Chain slots 3.3.1 Provisioning |
31 | 3.4 Power Transmitter private keys 3.5 Other private keys |
32 | 4 Authentication protocol 4.1 Digest query 4.2 Certificate Chain read |
33 | 4.3 Authentication challenge 4.4 Errors and alerts 4.4.1 Invalid request 4.4.2 Unsupported protocol version 4.4.3 Busy 4.4.4 Unspecified |
34 | 5 Authentication messages |
35 | 5.1 Authentication message header |
36 | 5.2 Authentication requests 5.2.1 GET_DIGESTS |
37 | 5.2.2 GET_CERTIFICATE |
38 | 5.2.3 CHALLENGE |
39 | 5.3 Authentication responses 5.3.1 DIGESTS |
40 | 5.3.2 CERTIFICATE |
41 | 5.3.3 CHALLENGE_AUTH |
42 | 5.3.4 Error |
44 | 6 Timing requirements 6.1 Power Receiver timing requirements |
45 | 6.2 Power Transmitter timing requirements |
46 | 7 Protocol flow examples 7.1 Simple flow |
47 | 7.2 Flow with caching |
48 | 7.3 Flow with caching and revocation |
49 | 7.4 Challenge first flow |
51 | 8 Cryptographic examples (informative) 8.1 X.509 Certificate basics |
52 | 8.1.1 Verifying the ECDSA signature of an X.509 Certificate 8.2 Dummy Root CA Certificate 8.2.1 Dummy Root CA Certificate – DER-encoded 8.2.3 Dummy Root CA Certificate – data 8.2.4 Verification of the Root CA Certificate signature |
53 | 8.2.2 Dummy Root CA Certificate – hash |
55 | 8.3 Manufacturer CA Certificate Example |
56 | 8.3.1 Example Manufacturer CA Certificate — DER-encoded 8.3.2 Example Manufacturer CA Certificate – data |
57 | 8.3.3 Verification of the Manufacturer CA Certificate signature |
58 | 8.4 Example Product Unit Certificates 8.4.1 Example 1: maximum length Product Unit Certificate |
61 | 8.4.2 Example 2: typical length Product Unit Certificate |
64 | 8.5 Certificate Chain and digest of certificates example 8.5.1 Example 1: maximum length Certificate Chain |
66 | 8.5.2 Example 2: typical length Certificate Chain |
67 | 8.6 Authentication examples 8.6.1 Test of example 1, maximum length Certificate Chain 8.6.1.1 GET_DIGESTS request 8.6.1.2 DIGESTS response |
68 | 8.6.1.3 GET_CERTIFICATE request 8.6.1.4 CERTIFICATE response |
69 | 8.6.1.5 Processing of the CERTIFICATE response data |
72 | 8.6.1.6 CHALLENGE request 8.6.1.7 Processing of the CHALLENGE request message |
73 | 8.6.1.8 CHALLENGE_AUTH response |
74 | 8.6.1.9 Processing the CHALLENGE_AUTH response message 8.6.2 Test of example 2, typical length Certificate Chain 8.6.2.1 GET_DIGESTS request |
75 | 8.6.2.2 DIGESTS response 8.6.2.3 GET_CERTIFICATE request |
76 | 8.6.2.4 First CERTIFICATE response |
77 | 8.6.2.5 Second GET_CERTIFICATE request 8.6.2.6 Second CERTIFICATE response 8.6.2.7 Processing of the second CERTIFICATE response |
78 | 8.6.2.8 CHALLENGE request |
79 | 8.6.2.9 Processing the CHALLENGE request message |
80 | 8.6.2.10 CHALLENGE_AUTH response 8.6.2.11 Processing the CHALLENGE_AUTH response message |
82 | Annex A: Sample data A.1 Dummy Root CA Certificate in PEM format |
83 | A.2 Dummy Root CA Certificate in ASN.1 parser output |
85 | A.3 Manufacturer CA Certificate in PEM Format |
86 | A.4 Manufacturer CA Certificate in ASN.1 parser output |
88 | A.5 Product Unit Certificate, example 1 in PEM format |
89 | A.6 Product Unit Certificate, example 1 in ASN.1 parser output |
91 | A.7 Product Unit Certificate, example 2 in PEM format |
92 | A.8 Product Unit Certificate, example 2 in ASN.1 parser output |