{"id":460342,"date":"2024-10-20T10:09:14","date_gmt":"2024-10-20T10:09:14","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-24-30489445-dc-2024\/"},"modified":"2024-10-26T18:46:16","modified_gmt":"2024-10-26T18:46:16","slug":"bsi-24-30489445-dc-2024","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-24-30489445-dc-2024\/","title":{"rendered":"BSI 24\/30489445 DC 2024"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\n30489445-NC.pdf <\/td>\n<\/tr>\n
3<\/td>\n100_4130e_CDV.pdf <\/td>\n<\/tr>\n
8<\/td>\n1 General
1.1 Structure of the Qi Specification <\/td>\n<\/tr>\n
9<\/td>\n1.2 Scope
1.3 Compliance
1.4 References <\/td>\n<\/tr>\n
10<\/td>\n1.5 Conventions
1.5.1 Notation of numbers
1.5.2 Tolerances
1.5.3 Fields in a data packet <\/td>\n<\/tr>\n
11<\/td>\n1.5.4 Notation of text strings
1.5.5 Short-hand notation for data packets <\/td>\n<\/tr>\n
12<\/td>\n1.6 Power Profiles <\/td>\n<\/tr>\n
13<\/td>\n2 Overview <\/td>\n<\/tr>\n
14<\/td>\n2.1 References <\/td>\n<\/tr>\n
16<\/td>\n2.2 Cryptographic methods
2.2.1 Random number generators
2.3 Security overview
2.3.1 Methodology
2.3.2 Periodic re-Authentication
2.4 Impact to existing ecosystem <\/td>\n<\/tr>\n
17<\/td>\n2.5 Support for revocation <\/td>\n<\/tr>\n
18<\/td>\n3 Certificates and private keys
3.1 Certificate Chains <\/td>\n<\/tr>\n
20<\/td>\n3.2 Certificates
3.2.1 Format of Certificates
3.2.1.1 Textual format
3.2.1.2 Attributes and Extensions <\/td>\n<\/tr>\n
22<\/td>\n3.2.1.3 Manufacturer CA Certificate <\/td>\n<\/tr>\n
25<\/td>\n3.2.1.4 Product Unit Certificate <\/td>\n<\/tr>\n
28<\/td>\n3.2.1.5 Root CA Certificate <\/td>\n<\/tr>\n
29<\/td>\n3.2.1.6 Additional attributes and extensions
3.2.1.7 Constraints <\/td>\n<\/tr>\n
30<\/td>\n3.3 Certificate Chain slots
3.3.1 Provisioning <\/td>\n<\/tr>\n
31<\/td>\n3.4 Power Transmitter private keys
3.5 Other private keys <\/td>\n<\/tr>\n
32<\/td>\n4 Authentication protocol
4.1 Digest query
4.2 Certificate Chain read <\/td>\n<\/tr>\n
33<\/td>\n4.3 Authentication challenge
4.4 Errors and alerts
4.4.1 Invalid request
4.4.2 Unsupported protocol version
4.4.3 Busy
4.4.4 Unspecified <\/td>\n<\/tr>\n
34<\/td>\n5 Authentication messages <\/td>\n<\/tr>\n
35<\/td>\n5.1 Authentication message header <\/td>\n<\/tr>\n
36<\/td>\n5.2 Authentication requests
5.2.1 GET_DIGESTS <\/td>\n<\/tr>\n
37<\/td>\n5.2.2 GET_CERTIFICATE <\/td>\n<\/tr>\n
38<\/td>\n5.2.3 CHALLENGE <\/td>\n<\/tr>\n
39<\/td>\n5.3 Authentication responses
5.3.1 DIGESTS <\/td>\n<\/tr>\n
40<\/td>\n5.3.2 CERTIFICATE <\/td>\n<\/tr>\n
41<\/td>\n5.3.3 CHALLENGE_AUTH <\/td>\n<\/tr>\n
42<\/td>\n5.3.4 Error <\/td>\n<\/tr>\n
44<\/td>\n6 Timing requirements
6.1 Power Receiver timing requirements <\/td>\n<\/tr>\n
45<\/td>\n6.2 Power Transmitter timing requirements <\/td>\n<\/tr>\n
46<\/td>\n7 Protocol flow examples
7.1 Simple flow <\/td>\n<\/tr>\n
47<\/td>\n7.2 Flow with caching <\/td>\n<\/tr>\n
48<\/td>\n7.3 Flow with caching and revocation <\/td>\n<\/tr>\n
49<\/td>\n7.4 Challenge first flow <\/td>\n<\/tr>\n
51<\/td>\n8 Cryptographic examples (informative)
8.1 X.509 Certificate basics <\/td>\n<\/tr>\n
52<\/td>\n8.1.1 Verifying the ECDSA signature of an X.509 Certificate
8.2 Dummy Root CA Certificate
8.2.1 Dummy Root CA Certificate \u2013 DER-encoded
8.2.3 Dummy Root CA Certificate \u2013 data
8.2.4 Verification of the Root CA Certificate signature <\/td>\n<\/tr>\n
53<\/td>\n8.2.2 Dummy Root CA Certificate \u2013 hash <\/td>\n<\/tr>\n
55<\/td>\n8.3 Manufacturer CA Certificate Example <\/td>\n<\/tr>\n
56<\/td>\n8.3.1 Example Manufacturer CA Certificate \u2014 DER-encoded
8.3.2 Example Manufacturer CA Certificate – data <\/td>\n<\/tr>\n
57<\/td>\n8.3.3 Verification of the Manufacturer CA Certificate signature <\/td>\n<\/tr>\n
58<\/td>\n8.4 Example Product Unit Certificates
8.4.1 Example 1: maximum length Product Unit Certificate <\/td>\n<\/tr>\n
61<\/td>\n8.4.2 Example 2: typical length Product Unit Certificate <\/td>\n<\/tr>\n
64<\/td>\n8.5 Certificate Chain and digest of certificates example
8.5.1 Example 1: maximum length Certificate Chain <\/td>\n<\/tr>\n
66<\/td>\n8.5.2 Example 2: typical length Certificate Chain <\/td>\n<\/tr>\n
67<\/td>\n8.6 Authentication examples
8.6.1 Test of example 1, maximum length Certificate Chain
8.6.1.1 GET_DIGESTS request
8.6.1.2 DIGESTS response <\/td>\n<\/tr>\n
68<\/td>\n8.6.1.3 GET_CERTIFICATE request
8.6.1.4 CERTIFICATE response <\/td>\n<\/tr>\n
69<\/td>\n8.6.1.5 Processing of the CERTIFICATE response data <\/td>\n<\/tr>\n
72<\/td>\n8.6.1.6 CHALLENGE request
8.6.1.7 Processing of the CHALLENGE request message <\/td>\n<\/tr>\n
73<\/td>\n8.6.1.8 CHALLENGE_AUTH response <\/td>\n<\/tr>\n
74<\/td>\n8.6.1.9 Processing the CHALLENGE_AUTH response message
8.6.2 Test of example 2, typical length Certificate Chain
8.6.2.1 GET_DIGESTS request <\/td>\n<\/tr>\n
75<\/td>\n8.6.2.2 DIGESTS response
8.6.2.3 GET_CERTIFICATE request <\/td>\n<\/tr>\n
76<\/td>\n8.6.2.4 First CERTIFICATE response <\/td>\n<\/tr>\n
77<\/td>\n8.6.2.5 Second GET_CERTIFICATE request
8.6.2.6 Second CERTIFICATE response
8.6.2.7 Processing of the second CERTIFICATE response <\/td>\n<\/tr>\n
78<\/td>\n8.6.2.8 CHALLENGE request <\/td>\n<\/tr>\n
79<\/td>\n8.6.2.9 Processing the CHALLENGE request message <\/td>\n<\/tr>\n
80<\/td>\n8.6.2.10 CHALLENGE_AUTH response
8.6.2.11 Processing the CHALLENGE_AUTH response message <\/td>\n<\/tr>\n
82<\/td>\nAnnex A: Sample data
A.1 Dummy Root CA Certificate in PEM format <\/td>\n<\/tr>\n
83<\/td>\nA.2 Dummy Root CA Certificate in ASN.1 parser output <\/td>\n<\/tr>\n
85<\/td>\nA.3 Manufacturer CA Certificate in PEM Format <\/td>\n<\/tr>\n
86<\/td>\nA.4 Manufacturer CA Certificate in ASN.1 parser output <\/td>\n<\/tr>\n
88<\/td>\nA.5 Product Unit Certificate, example 1 in PEM format <\/td>\n<\/tr>\n
89<\/td>\nA.6 Product Unit Certificate, example 1 in ASN.1 parser output <\/td>\n<\/tr>\n
91<\/td>\nA.7 Product Unit Certificate, example 2 in PEM format <\/td>\n<\/tr>\n
92<\/td>\nA.8 Product Unit Certificate, example 2 in ASN.1 parser output <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

BS EN IEC 63563-9 Qi Specification version 2.0 – Part 9. Authentication Protocol (Fast track)<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2024<\/td>\n93<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":460352,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-460342","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/460342","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/460352"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=460342"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=460342"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=460342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}