BSI PD CEN/TS 15130:2020
$189.07
Postal services. DPM infrastructure. Messages supporting DPM applications
Published By | Publication Date | Number of Pages |
BSI | 2020 | 48 |
This document specifies the information exchanges between various parties’ infrastructures that take place in support of DPM applications. It complements standards that address the design, security, applications and readability of Digital Postage Marks.
The following items will be addressed by this document:
-
identification of parties participating in exchanges of information described by this document;
-
identification of functions (interactions, use cases);
-
definition of parties’ responsibilities in the context of above functions;
-
definition of messages between parties: message meaning and definition of communication protocols to support each function;
-
definition of significant content (payload) for each message;
-
security mechanisms providing required security services, such as authentication, privacy, integrity and non-repudiation.
This document does not address:
-
design of DPM supporting infrastructure for applications internal to providers and carriers;
-
design of DPM devices and applications for applications internal to end-users.
Although there are other communications between various parties involved in postal communications, this document covers only DPM-related aspects of such communications.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
7 | 1 Scope 2 Normative references 3 Terms and definitions |
12 | 4 Requirements 4.1 Functional structure 4.2 Technical requirements |
13 | 4.3 Security requirements 4.3.1 General 4.3.2 Introduction 4.3.3 Security business objectives, policy and economics |
14 | 4.3.4 Threats and vulnerabilities (attacks) |
16 | 4.3.5 Vendor-post channel 5 Description of the models (system architecture and interaction diagrams) 5.1 Introduction |
17 | 5.2 Key management processes 5.2.1 General 5.2.2 Initialization and re-key of the vendor-post key management infrastructure |
18 | 5.2.3 Distribution of cryptographic material for DPM protection 5.2.3.1 Introduction 5.2.3.2 Overview of the process |
22 | 5.2.3.3 Protocol description 5.2.3.4 Vendor requests key for new Mailing System |
23 | 5.2.3.5 The post processes the vendor’s new mailing system key request |
24 | 5.2.3.6 The post delivers key for new mailing system to vendor 5.2.4 Withdrawal of mailing system 5.3 Licensing, parameterization and operational variables of a mailing system 5.3.1 General |
25 | 5.3.2 Licensing and parameterization – Protocol description 5.3.3 Update of operational variables – Protocol description |
26 | 5.4 Data collection and reporting processes 5.4.1 General |
27 | 5.4.2 Financial reporting from vendor to post 5.4.2.1 General 5.4.2.2 Protocol description |
29 | 5.4.2.3 Data content – Financial reporting |
31 | 5.4.3 Activity reporting from vendor to post 5.4.3.1 General 5.4.3.2 Protocol description |
32 | 5.4.3.3 Data content – Activity reporting |
35 | 5.4.4 Administrative reporting from vendor to post 5.4.4.1 General 5.4.4.2 Protocol description 5.4.4.3 Data content |
38 | 5.5 Audit-related processes 5.5.1 General 5.5.2 Audit of infrastructure elements |
40 | Annex A (normative)Implicit certification process |
42 | Annex B (normative)Message structure |
45 | Annex C (informative)Development principles |