Shopping Cart

No products in the cart.

BSI PD CEN/TS 15130:2020

$189.07

Postal services. DPM infrastructure. Messages supporting DPM applications

Published By Publication Date Number of Pages
BSI 2020 48
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This document specifies the information exchanges between various parties’ infrastructures that take place in support of DPM applications. It complements standards that address the design, security, applications and readability of Digital Postage Marks.

The following items will be addressed by this document:

  • identification of parties participating in exchanges of information described by this document;

  • identification of functions (interactions, use cases);

  • definition of parties’ responsibilities in the context of above functions;

  • definition of messages between parties: message meaning and definition of communication protocols to support each function;

  • definition of significant content (payload) for each message;

  • security mechanisms providing required security services, such as authentication, privacy, integrity and non-repudiation.

This document does not address:

  • design of DPM supporting infrastructure for applications internal to providers and carriers;

  • design of DPM devices and applications for applications internal to end-users.

NOTE

Although there are other communications between various parties involved in postal communications, this document covers only DPM-related aspects of such communications.

PDF Catalog

PDF Pages PDF Title
2 undefined
7 1 Scope
2 Normative references
3 Terms and definitions
12 4 Requirements
4.1 Functional structure
4.2 Technical requirements
13 4.3 Security requirements
4.3.1 General
4.3.2 Introduction
4.3.3 Security business objectives, policy and economics
14 4.3.4 Threats and vulnerabilities (attacks)
16 4.3.5 Vendor-post channel
5 Description of the models (system architecture and interaction diagrams)
5.1 Introduction
17 5.2 Key management processes
5.2.1 General
5.2.2 Initialization and re-key of the vendor-post key management infrastructure
18 5.2.3 Distribution of cryptographic material for DPM protection
5.2.3.1 Introduction
5.2.3.2 Overview of the process
22 5.2.3.3 Protocol description
5.2.3.4 Vendor requests key for new Mailing System
23 5.2.3.5 The post processes the vendor’s new mailing system key request
24 5.2.3.6 The post delivers key for new mailing system to vendor
5.2.4 Withdrawal of mailing system
5.3 Licensing, parameterization and operational variables of a mailing system
5.3.1 General
25 5.3.2 Licensing and parameterization – Protocol description
5.3.3 Update of operational variables – Protocol description
26 5.4 Data collection and reporting processes
5.4.1 General
27 5.4.2 Financial reporting from vendor to post
5.4.2.1 General
5.4.2.2 Protocol description
29 5.4.2.3 Data content – Financial reporting
31 5.4.3 Activity reporting from vendor to post
5.4.3.1 General
5.4.3.2 Protocol description
32 5.4.3.3 Data content – Activity reporting
35 5.4.4 Administrative reporting from vendor to post
5.4.4.1 General
5.4.4.2 Protocol description
5.4.4.3 Data content
38 5.5 Audit-related processes
5.5.1 General
5.5.2 Audit of infrastructure elements
40 Annex A (normative)Implicit certification process
42 Annex B (normative)Message structure
45 Annex C (informative)Development principles
BSI PD CEN/TS 15130:2020
$189.07