{"id":407560,"date":"2024-10-20T05:26:39","date_gmt":"2024-10-20T05:26:39","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-1609-2-1-2022\/"},"modified":"2024-10-26T09:53:52","modified_gmt":"2024-10-26T09:53:52","slug":"ieee-1609-2-1-2022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-1609-2-1-2022\/","title":{"rendered":"IEEE 1609.2.1-2022"},"content":{"rendered":"

Revision Standard – Active. Certificate management protocols are specified in this document to support provisioning and management of digital certificates, as specified in IEEE Std 1609.2(TM), to end entities, that is, an actor that uses digital certificates to authorize application activities<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nIEEE Std 1609.2.1\u2122-2022 Front cover <\/td>\n<\/tr>\n
2<\/td>\nTitle page <\/td>\n<\/tr>\n
4<\/td>\nImportant Notices and Disclaimers Concerning IEEE Standards Documents
Notice and Disclaimer of Liability Concerning the Use of IEEE Standards Documents
Translations <\/td>\n<\/tr>\n
5<\/td>\nOfficial statements
Comments on standards
Laws and regulations
Data privacy
Copyrights <\/td>\n<\/tr>\n
6<\/td>\nPhotocopies
Updating of IEEE Standards documents
Errata
Patents <\/td>\n<\/tr>\n
7<\/td>\nIMPORTANT NOTICE <\/td>\n<\/tr>\n
8<\/td>\nParticipants <\/td>\n<\/tr>\n
9<\/td>\nIntroduction <\/td>\n<\/tr>\n
10<\/td>\nContents <\/td>\n<\/tr>\n
13<\/td>\n1. Overview
1.1 Scope
1.2 Purpose
1.3 Word usage <\/td>\n<\/tr>\n
14<\/td>\n2. Normative references <\/td>\n<\/tr>\n
15<\/td>\n3. Definitions, acronyms, and abbreviations
3.1 Definitions <\/td>\n<\/tr>\n
20<\/td>\n3.2 Acronyms and abbreviations <\/td>\n<\/tr>\n
23<\/td>\n4. Architecture
4.1 Security Credential Management System (SCMS)
4.1.1 General <\/td>\n<\/tr>\n
28<\/td>\n4.1.2 Supported interfaces
4.1.2.1 General
4.1.2.2 ACA\u2013EE interface
4.1.2.3 DC\u2013EE interface <\/td>\n<\/tr>\n
29<\/td>\n4.1.2.4 ECA\u2013EE interface
4.1.2.5 EE\u2013MA interface
4.1.2.6 EE\u2013RA interface
4.1.2.7 EE\u2013SAS interface <\/td>\n<\/tr>\n
30<\/td>\n4.1.3 Types of enrollment certificate
4.1.4 Assumed lifecycle and use cases
4.1.4.1 General <\/td>\n<\/tr>\n
31<\/td>\n4.1.4.2 Initial enrollment certificate request\/download <\/td>\n<\/tr>\n
32<\/td>\n4.1.4.3 Use cases authenticated with the enrollment certificate <\/td>\n<\/tr>\n
34<\/td>\n4.1.4.4 Use cases authorized with authorization certificate\u2014Misbehavior report submission
4.1.4.5 Use cases that may be authorized with enrollment certificate or may be unauthorized <\/td>\n<\/tr>\n
35<\/td>\n4.1.5 Misbehavior authorities <\/td>\n<\/tr>\n
36<\/td>\n4.1.6 Composite CRL
4.1.6.1 General
4.1.6.2 CRL download <\/td>\n<\/tr>\n
37<\/td>\n4.1.7 Certificate chain files
4.1.8 Elector and root certificate authority management <\/td>\n<\/tr>\n
39<\/td>\n4.2 Interface approach <\/td>\n<\/tr>\n
40<\/td>\n4.3 System parameters
4.3.1 General
4.3.2 Time period parameters
4.3.2.1 General <\/td>\n<\/tr>\n
41<\/td>\n4.3.2.2 Parameter mapping
4.3.2.3 Parameter usage <\/td>\n<\/tr>\n
42<\/td>\n4.3.2.4 Approaches for smooth transition <\/td>\n<\/tr>\n
45<\/td>\n4.3.3 Session parameters
4.3.4 Web API parameters: generic
4.3.5 Web API parameters: SCMS REST API v3 <\/td>\n<\/tr>\n
46<\/td>\n4.3.6 Use case related parameters <\/td>\n<\/tr>\n
48<\/td>\n5. Secure session
5.1 General
5.1.1 General
5.1.2 SCMS component authentication
5.1.3 End entity authentication <\/td>\n<\/tr>\n
49<\/td>\n5.2 Physical security
5.2.1 General
5.2.2 Protocol parameters
5.3 Transport Layer Security (TLS)
5.3.1 Prerequisites
5.3.1.1 General <\/td>\n<\/tr>\n
50<\/td>\n5.3.1.2 SCMS component certificate and certificate acceptance policy
5.3.1.3 Root CA certificate
5.3.1.4 OCSP support
5.3.2 Protocol constraints <\/td>\n<\/tr>\n
51<\/td>\n5.3.3 Protocol options
5.3.4 Protocol parameters
5.4 ISO\/TS 21177
5.4.1 Prerequisites
5.4.1.1 General
5.4.1.2 SCMS component certificate and certificate acceptance policy <\/td>\n<\/tr>\n
52<\/td>\n5.4.1.3 Root CA certificate
5.4.2 Protocol constraints
5.4.3 Protocol parameters <\/td>\n<\/tr>\n
53<\/td>\n5.4.4 Client authentication with an enrollment certificate
6. Web API
6.1 General
6.1.1 General
6.1.2 Protocol parameters <\/td>\n<\/tr>\n
54<\/td>\n6.1.3 Hexadecimal encoding of integers
6.2 OAuth 2.0 bearer authorization
6.2.1 General
6.2.2 Protocol flow
6.2.2.1 General <\/td>\n<\/tr>\n
55<\/td>\n6.2.2.2 AT headers
6.2.2.3 AT claims
6.2.2.4 JWKS API <\/td>\n<\/tr>\n
56<\/td>\n6.2.3 OAuth 2.0 AT acceptance policy
6.3 SCMS REST API v3
6.3.1 General
6.3.1.1 Organization of this subclause <\/td>\n<\/tr>\n
57<\/td>\n6.3.1.2 Conventions
6.3.1.3 Protocol parameters <\/td>\n<\/tr>\n
58<\/td>\n6.3.1.4 HTTP headers
6.3.1.5 Error codes <\/td>\n<\/tr>\n
60<\/td>\n6.3.1.6 HTTP options
6.3.1.7 Profiles
6.3.2 ACA\u2013EE interface
6.3.3 DC\u2013EE interface <\/td>\n<\/tr>\n
61<\/td>\n6.3.4 ECA\u2013EE interface
6.3.4.1 General
6.3.4.2 Enrollment certificate request <\/td>\n<\/tr>\n
63<\/td>\n6.3.5 EE\u2013RA interface
6.3.5.1 General
6.3.5.2 Authorization certificate request <\/td>\n<\/tr>\n
66<\/td>\n6.3.5.3 Authorization certificate download <\/td>\n<\/tr>\n
71<\/td>\n6.3.5.4 Successor enrollment certificate request <\/td>\n<\/tr>\n
73<\/td>\n6.3.5.5 Successor enrollment certificate download <\/td>\n<\/tr>\n
75<\/td>\n6.3.5.6 Misbehavior report submission <\/td>\n<\/tr>\n
76<\/td>\n6.3.5.7 CCF including CTL download <\/td>\n<\/tr>\n
78<\/td>\n6.3.5.8 Composite CRL including CTL download <\/td>\n<\/tr>\n
80<\/td>\n6.3.5.9 Individual CA certificate download <\/td>\n<\/tr>\n
82<\/td>\n6.3.5.10 Individual CRL download <\/td>\n<\/tr>\n
84<\/td>\n6.3.5.11 CTL download <\/td>\n<\/tr>\n
86<\/td>\n6.3.5.12 RA certificate download <\/td>\n<\/tr>\n
88<\/td>\n6.3.5.13 MA certificate download <\/td>\n<\/tr>\n
90<\/td>\n6.3.5.14 Certificate management information status download <\/td>\n<\/tr>\n
92<\/td>\n7. Data structures\u2014Abstract Syntax Notation 1 (ASN.1)
7.1 Presentation and encoding
7.2 Data structures from IEEE Std 1609.2
7.2.1 General
7.2.2 BasePublicEncryptionKey
7.2.3 BitmapSsp
7.2.4 BitmapSspRange
7.2.5 Certificate <\/td>\n<\/tr>\n
93<\/td>\n7.2.6 CertificateId
7.2.7 CertificateType
7.2.8 CrlSeries
7.2.9 Duration
7.2.10 EccP256CurvePoint
7.2.11 EccP384CurvePoint
7.2.12 EcdsaP256Signature
7.2.13 EcdsaP384Signature
7.2.14 EncryptedData
7.2.15 GeographicRegion
7.2.16 HashAlgorithm
7.2.17 HashedId3
7.2.18 HashedId8 <\/td>\n<\/tr>\n
94<\/td>\n7.2.19 HashedId10
7.2.20 Hostname
7.2.21 Ieee1609Dot2Data
7.2.22 IValue
7.2.23 LaId
7.2.24 LinkageData
7.2.25 PKRecipientInfo
7.2.26 Psid
7.2.27 PsidGroupPermissions
7.2.28 PsidSspRange
7.2.29 PublicEncryptionKey
7.2.30 SecuredCrl
7.2.31 SequenceOfCertificate <\/td>\n<\/tr>\n
95<\/td>\n7.2.32 SequenceOfPsidGroupPermissions
7.2.33 SequenceOfPsidSsp
7.2.34 SignedData
7.2.35 SignerIdentifier
7.2.36 SspRange
7.2.37 SubjectAssurance
7.2.38 Time32
7.2.39 Uint8
7.2.40 Uint16
7.2.41 ValidityPeriod
7.2.42 VerificationKeyIndicator
7.3 SCMS protocol data unit structures
7.3.1 General <\/td>\n<\/tr>\n
96<\/td>\n7.3.2 ScmsPdu
7.3.3 AcaEeInterfacePdu <\/td>\n<\/tr>\n
97<\/td>\n7.3.4 AcaEeCertResponse
7.3.5 AcaLaInterfacePdu
7.3.6 AcaMaInterfacePdu <\/td>\n<\/tr>\n
98<\/td>\n7.3.7 AcaRaInterfacePdu
7.3.8 CertManagementPdu
7.3.9 CompositeCrl
7.3.10 CertificateChain <\/td>\n<\/tr>\n
99<\/td>\n7.3.11 MultiSignedCtl
7.3.12 IEEE-1609-2-1-MSCTL
7.3.13 Ieee1609dot2dot1Ctls <\/td>\n<\/tr>\n
100<\/td>\n7.3.14 Ieee1609dot2dot1MsctlType
7.3.15 FullIeeeTbsCtl <\/td>\n<\/tr>\n
101<\/td>\n7.3.16 CtlSeriesId
7.3.17 CtlSequenceNumber
7.3.18 CtlElectorEntry <\/td>\n<\/tr>\n
102<\/td>\n7.3.19 CtlRootCaEntry
7.3.20 ToBeSignedCtlSignature
7.3.21 CertificateManagementInfoStatus
7.3.22 SequenceOfCtlInfoStatus <\/td>\n<\/tr>\n
103<\/td>\n7.3.23 CtlInfoStatus
7.3.24 SequenceOfCrlInfoStatus
7.3.25 CrlInfoStatus
7.3.26 SequenceOfMaInfoStatus
7.3.27 MaInfoStatus <\/td>\n<\/tr>\n
104<\/td>\n7.3.28 EcaEeInterfacePdu
7.3.29 EeEcaCertRequest <\/td>\n<\/tr>\n
105<\/td>\n7.3.30 EcaEeCertResponse <\/td>\n<\/tr>\n
106<\/td>\n7.3.31 EeMaInterfacePdu
7.3.32 EeRaInterfacePdu
7.3.33 EeRaCertRequest <\/td>\n<\/tr>\n
108<\/td>\n7.3.34 AdditionalParams
7.3.35 ButterflyParamsOriginal
7.3.36 ButterflyExpansion
7.3.37 RaEeCertAck <\/td>\n<\/tr>\n
109<\/td>\n7.3.38 RaEeCertInfo
7.3.39 EeRaDownloadRequest <\/td>\n<\/tr>\n
110<\/td>\n7.3.40 LaMaInterfacePdu
7.3.41 LaRaInterfacePdu
7.3.42 MaRaInterfacePdu
7.3.43 SecurityMgmtPsid
7.3.44 SignedCertificateRequest <\/td>\n<\/tr>\n
111<\/td>\n7.3.45 SignedX509CertificateRequest <\/td>\n<\/tr>\n
112<\/td>\n7.3.46 SignerSelf
7.3.47 SignerSingleCert
7.3.48 SignerSingleX509Cert
7.3.49 SequenceOfX509Certificate
7.3.50 X509Certificate
7.3.51 X509SignerIdentifier <\/td>\n<\/tr>\n
113<\/td>\n7.4 Secured protocol data unit structures
7.4.1 General
7.4.2 AcaEeCertResponseCubkSpdu
7.4.3 AcaEeCertResponsePlainSpdu
7.4.4 AcaEeCertResponsePrivateSpdu <\/td>\n<\/tr>\n
115<\/td>\n7.4.5 CertificateChainSpdu
7.4.6 CertificateManagementInformationStatusSpdu
7.4.7 CompositeCrlSpdu <\/td>\n<\/tr>\n
116<\/td>\n7.4.8 CtlSignatureSpdu
7.4.9 EcaEeCertResponseSpdu
7.4.10 EeEcaCertRequestSpdu <\/td>\n<\/tr>\n
117<\/td>\n7.4.11 EeRa1609Dot2AuthenticatedCertRequestSpdu
7.4.12 EeRaCertRequestSpdu
7.4.13 EeRaDownloadRequestPlainSpdu
7.4.14 EeRaDownloadRequestSpdu <\/td>\n<\/tr>\n
118<\/td>\n7.4.15 EeRaSuccessorEnrollmentCertRequestSpdu
7.4.16 EeRaX509AuthenticatedCertRequestSpdu
7.4.17 MultiSignedCtlSpdu
7.4.18 RaEeCertAckSpdu <\/td>\n<\/tr>\n
119<\/td>\n7.4.19 RaEeCertAndAcpcInfoSpdu
7.4.20 RaEeCertInfoSpdu
7.4.21 RaEeEnrollmentCertAckSpdu <\/td>\n<\/tr>\n
120<\/td>\n7.5 Parameterized types
7.5.1 General
7.5.2 Ieee1609Dot2Data-Encrypted
7.5.3 Ieee1609Dot2Data-EncryptedSigned
7.5.4 Ieee1609Dot2Data-Signed <\/td>\n<\/tr>\n
121<\/td>\n7.5.5 Ieee1609Dot2Data-SignedCertRequest
7.5.6 Ieee1609Dot2Data-SignedEncrypted <\/td>\n<\/tr>\n
122<\/td>\n7.5.7 Ieee1609Dot2Data-SignedEncryptedCertRequest
7.5.8 Ieee1609Dot2Data-SignedX509AuthenticatedCertRequest
7.5.9 Ieee1609Dot2Data-SymmEncryptedSingleRecipient <\/td>\n<\/tr>\n
123<\/td>\n7.5.10 Ieee1609Dot2Data-Unsecured
7.5.11 ScmsPdu-Scoped
7.5.12 ScopedCertificateRequest <\/td>\n<\/tr>\n
124<\/td>\n7.6 Certificate profiles
7.6.1 General
7.6.2 Service specific permissions (SSP)
7.6.2.1 General
7.6.2.2 SecurityMgmtSsp <\/td>\n<\/tr>\n
125<\/td>\n7.6.2.3 AcaSsp
7.6.2.4 CrlSignerSsp
7.6.2.5 DcmSsp
7.6.2.6 EcaSsp
7.6.2.7 EeSsp <\/td>\n<\/tr>\n
126<\/td>\n7.6.2.8 ElectorSsp
7.6.2.9 IcaSsp
7.6.2.10 LaSsp
7.6.2.11 LopSsp
7.6.2.12 MaSsp <\/td>\n<\/tr>\n
127<\/td>\n7.6.2.13 PgSsp
7.6.2.14 RaSsp
7.6.2.15 RootCaSsp
7.6.2.16 DcSsp
7.6.3 Certificate profiles for SCMS components and end entities
7.6.3.1 General <\/td>\n<\/tr>\n
128<\/td>\n7.6.3.2 ACA certificate profile
7.6.3.3 Authorization certificate profile
7.6.3.4 DC certificate profile
7.6.3.5 ECA certificate profile <\/td>\n<\/tr>\n
129<\/td>\n7.6.3.6 Elector certificate profile
7.6.3.7 Enrollment (IEEE 1609.2) certificate profile
7.6.3.8 Enrollment (ITU-T X.509) certificate profile <\/td>\n<\/tr>\n
130<\/td>\n7.6.3.9 MA certificate profile
7.6.3.10 RA certificate profile
8. Data structures\u2014files
8.1 General <\/td>\n<\/tr>\n
131<\/td>\n8.2 Authorization certificate download files
8.2.1 General
8.2.2 Naming convention
8.2.3 File contents
8.2.3.1 Nonbutterfly certificate file contents
8.2.3.2 Butterfly certificate file contents <\/td>\n<\/tr>\n
132<\/td>\n8.2.4 Validity of certificates in zip files
8.2.4.1 General
8.2.4.2 Correspondence between private key and public key <\/td>\n<\/tr>\n
133<\/td>\n8.2.4.3 Certificates generated using ACPC
8.3 Successor enrollment certificate download files
8.3.1 General
8.3.2 Naming convention
8.4 Certificate chain files
8.4.1 General
8.4.2 Naming convention <\/td>\n<\/tr>\n
134<\/td>\n8.5 Composite CRL files
8.5.1 General
8.5.2 Naming convention
8.6 CTL files
8.7 Certificate management information status files
9. Cryptographic constructions
9.1 General
9.1.1 General
9.1.2 Butterfly keys <\/td>\n<\/tr>\n
135<\/td>\n9.1.3 ACPC
9.2 Butterfly keys and SCMS architecture
9.2.1 General <\/td>\n<\/tr>\n
139<\/td>\n9.2.2 Relationship to SCMS reference architecture
9.2.3 Alternatives to butterfly key step <\/td>\n<\/tr>\n
140<\/td>\n9.2.4 Privacy against insiders
9.2.5 Types of butterfly keys <\/td>\n<\/tr>\n
141<\/td>\n9.3 Butterfly key mechanism
9.3.1 General
9.3.1.1 General
9.3.1.2 Caterpillar key generation
9.3.1.3 Cocoon key derivation <\/td>\n<\/tr>\n
142<\/td>\n9.3.1.4 Butterfly key derivation
9.3.2 Notation
9.3.3 Caterpillar keypair generation <\/td>\n<\/tr>\n
143<\/td>\n9.3.3.1 Butterfly expansion functions <\/td>\n<\/tr>\n
144<\/td>\n9.3.4 Cocoon key derivation
9.3.4.1 Cocoon private key derivation
9.3.4.2 Cocoon public key derivation <\/td>\n<\/tr>\n
145<\/td>\n9.3.5 Butterfly key derivation
9.3.5.1 Butterfly private key derivation
9.3.5.2 Butterfly public key derivation <\/td>\n<\/tr>\n
146<\/td>\n9.3.6 Certificate request, and response validity, with butterfly keys
9.3.6.1 General
9.3.6.2 Certificate request without butterfly key mechanism
9.3.6.3 Certificate request using the original butterfly key mechanism <\/td>\n<\/tr>\n
147<\/td>\n9.3.6.4 Certificate request using the unified butterfly key mechanism
9.3.6.5 Certificate request using the compact unified butterfly key mechanism <\/td>\n<\/tr>\n
148<\/td>\n9.4 ACPC and SCMS architecture
9.4.1 General <\/td>\n<\/tr>\n
150<\/td>\n9.4.2 Operations <\/td>\n<\/tr>\n
151<\/td>\n9.4.3 Terminology
9.4.4 ACPC and butterfly keys
9.5 Binary hash tree for ACPC activation codes
9.5.1 Binary hash tree\u2014background <\/td>\n<\/tr>\n
153<\/td>\n9.5.2 Calculating child node values from parent node values
9.5.2.1 Hash function output and APrV\/APuV derivation
9.5.2.2 AprvHashCalculationInput
9.5.2.3 AcpcTreeId <\/td>\n<\/tr>\n
154<\/td>\n9.5.2.4 AcpcNodeValue
9.5.3 Use of APrVs and APuVs within certificate generation
9.5.3.1 Butterfly keys <\/td>\n<\/tr>\n
155<\/td>\n9.5.3.2 ACPC without butterfly keys
9.5.4 Encoding of APrVs
9.5.4.1 Data structures and encoding <\/td>\n<\/tr>\n
157<\/td>\n9.5.4.2 Encoding\/decoding of binary tree node present\/absent information <\/td>\n<\/tr>\n
161<\/td>\n9.5.5 CAM certificate
9.5.5.1 AcpcSsp <\/td>\n<\/tr>\n
162<\/td>\n9.5.5.2 CamSsp
9.5.6 Distribution of APrVs <\/td>\n<\/tr>\n
163<\/td>\n10. Validity conditions for particular SPDUs
10.1 Validity of SignedCertificateRequest
10.1.1 General
10.1.2 Common validity conditions <\/td>\n<\/tr>\n
164<\/td>\n10.1.3 Initial (self-signed) enrollment certificate requests
10.1.4 Successor enrollment certificate requests
10.1.4.1 General <\/td>\n<\/tr>\n
165<\/td>\n10.1.4.2 Consistency between requested and requesting certRequestPermissions
10.1.4.3 Consistency between requested and requesting SspRanges <\/td>\n<\/tr>\n
168<\/td>\n10.1.5 Authorization certificate requests signed by 1609.2 enrollment certificates
10.1.5.1 General <\/td>\n<\/tr>\n
169<\/td>\n10.1.5.2 Authorization certificate requests with butterfly keys
10.1.6 Authorization certificate requests without butterfly keys
10.1.7 Consistency between appPermissions in a request and certRequestPermissions in an IEEE 1609.2 enrollment certificate
10.1.7.1 General
10.1.7.2 Atomic PsidSsp <\/td>\n<\/tr>\n
172<\/td>\n10.1.8 Consistency between an authorization certificate request and an ITU-T X.509 enrollment certificate
10.2 Validity of multisigned CTLs
10.2.1 General
10.2.2 Validity of a CTL
10.2.3 Validity of a CtlSignatureSpdu <\/td>\n<\/tr>\n
173<\/td>\n10.2.4 Requirements for the IEEE 1609.2 security services management entity
10.2.5 Updating the quorum value
11. Extensions and modifications of IEEE Std 1609.2
11.1 General <\/td>\n<\/tr>\n
174<\/td>\n11.2 Extensions and modifications of, and new data structures for, IEEE\u00a0Std\u00a01609.2
11.2.1 General
11.2.2 Additional cryptographic algorithms
11.2.3 Ieee1609Dot2Content
11.2.4 EccP384CurvePoint
11.2.5 HashedId32 <\/td>\n<\/tr>\n
175<\/td>\n11.2.6 HashedId48
11.2.7 Signature
11.2.8 ToBeSignedCertificate <\/td>\n<\/tr>\n
176<\/td>\n11.2.9 PublicVerificationKey
11.3 Identification of encoded data structures by their hash value
11.3.1 General
11.3.2 Canonicalization
11.3.3 Data objects identified by HashedIdX
11.3.3.1 General <\/td>\n<\/tr>\n
177<\/td>\n11.3.3.2 Additional purposes of HashedIdX
11.3.3.3 Whole-certificate hash <\/td>\n<\/tr>\n
178<\/td>\n11.3.3.4 PreSharedKeyRecipientInfo
11.3.3.5 SymmRecipientInfo
11.3.4 PKRecipientInfo
11.3.5 tbsCtlHash in ToBeSignedCtlSignature <\/td>\n<\/tr>\n
179<\/td>\nAnnex A (normative) Protocol Implementation Conformance Statement (PICS) proforma
A.1 Instructions for completing the PICS proforma <\/td>\n<\/tr>\n
181<\/td>\nA.2 PICS proforma\u2014IEEE Std 1609.2.1 <\/td>\n<\/tr>\n
208<\/td>\nAnnex B (normative)ASN.1 modules
B.1 General
B.2 Ieee1609Dot2Dot1AcaEeInterface.asn
B.3 Ieee1609Dot2Dot1AcaLaInterface.asn
B.4 Ieee1609Dot2Dot1AcaMaInterface.asn <\/td>\n<\/tr>\n
209<\/td>\nB.5 Ieee1609Dot2Dot1AcaRaInterface.asn
B.6 Ieee1609Dot2Dot1Acpc.asn
B.7 Ieee1609Dot2Dot1CamRaInterface.asn
B.8 Ieee1609Dot2Dot1CertManagement.asn
B.9 Ieee1609Dot2Dot1EcaEeInterface.asn
B.10 Ieee1609Dot2Dot1EeMaInterface.asn <\/td>\n<\/tr>\n
210<\/td>\nB.11 Ieee1609Dot2Dot1EeRaInterface.asn
B.12 Ieee1609Dot2Dot1LaMaInterface.asn
B.13 Ieee1609Dot2Dot1LaRaInterface.asn
B.14 Ieee1609Dot2Dot1MaRaInterface.asn
B.15 Ieee1609Dot2Dot1Protocol.asn <\/td>\n<\/tr>\n
211<\/td>\nB.16 Ieee1609Dot2Asn\/Ieee1609Dot2.asn
B.17 Ieee1609Dot2Asn\/Ieee1609Dot2BaseTypes.asn
B.18 Ieee1609Dot2Asn\/Ieee1609Dot2Crl.asn
B.19 Ieee1609Dot2Asn\/Ieee1609Dot2CrlBaseTypes.asn
B.20 Ieee1609Dot2Asn\/Ieee1609Dot2HeaderInfoExtensionBase.asn
B.21 Ieee1609Dot2Asn\/EtsiTs103097ExtensionModule.asn <\/td>\n<\/tr>\n
212<\/td>\nAnnex C (informative)Implementation profiles
C.1 General
C.2 Profile template <\/td>\n<\/tr>\n
213<\/td>\nC.3 Additional information <\/td>\n<\/tr>\n
214<\/td>\nC.4 Use case specific profile contents <\/td>\n<\/tr>\n
216<\/td>\nAnnex D (informative) Intermediate certificate authority (ICA) certificate profile <\/td>\n<\/tr>\n
217<\/td>\nAnnex E (informative) Example encodings of certificate profiles
E.1 General
E.2 Authorization certificate authority (ACA) certificate <\/td>\n<\/tr>\n
218<\/td>\nE.3 Distribution Center (DC) certificate
E.4 Enrollment certificate authority (ECA) certificate <\/td>\n<\/tr>\n
220<\/td>\nE.5 Elector certificate
E.6 Enrollment certificate <\/td>\n<\/tr>\n
221<\/td>\nE.7 Intermediate certificate authority (ICA) certificate <\/td>\n<\/tr>\n
222<\/td>\nE.8 Misbehavior authority (MA) certificate <\/td>\n<\/tr>\n
223<\/td>\nE.9 Registration authority (RA) certificate <\/td>\n<\/tr>\n
225<\/td>\nAnnex F (informative)Privacy-preserving generation of linkage values with two linkage authorities
F.1 General
F.2 Details of the approach <\/td>\n<\/tr>\n
227<\/td>\nF.3 Properties of the approach <\/td>\n<\/tr>\n
228<\/td>\nF.4 Details that are out of scope <\/td>\n<\/tr>\n
229<\/td>\nAnnex G (informative) Authorization certificate authority (ACA)\u2013registration authority (RA) interface
G.1 General
G.2 AcaRaInterfacePdu
G.3 RaAcaCertRequest <\/td>\n<\/tr>\n
231<\/td>\nG.4 RaAcaCertRequestFlags
G.5 LinkageInfo
G.6 EncryptedIndividualPLV
G.7 PreLinkageValue <\/td>\n<\/tr>\n
232<\/td>\nG.8 AcaRaCertResponse
G.9 AcaResponse
G.10 RaAcaCertRequestSpdu <\/td>\n<\/tr>\n
233<\/td>\nG.11 AcaRaCertResponseSpdu <\/td>\n<\/tr>\n
234<\/td>\nAnnex H (informative)Certificate access manager (CAM)\u2013registration authority (RA) interface
H.1 General
H.2 CamRaInterfacePdu
H.3 RaCamBatchRequest
H.4 CamRaBatchResponse <\/td>\n<\/tr>\n
235<\/td>\nH.5 CamRaBatchResponse <\/td>\n<\/tr>\n
236<\/td>\nAnnex I (informative)Mapping enrollment certificate permissions to authorization certificate permissions
I.1 General <\/td>\n<\/tr>\n
237<\/td>\nI.2 ETSI model support <\/td>\n<\/tr>\n
238<\/td>\nAnnex J (informative) Root certificate authority (CA) management and failure recovery
J.1 Elector replacement <\/td>\n<\/tr>\n
243<\/td>\nJ.2 Revoking a root CA certificate <\/td>\n<\/tr>\n
246<\/td>\nJ.3 Adding a root CA certificate <\/td>\n<\/tr>\n
252<\/td>\nAnnex K (informative) Network communications architecture
K.1 General <\/td>\n<\/tr>\n
255<\/td>\nK.2 Location obscurer proxy <\/td>\n<\/tr>\n
256<\/td>\nAnnex L (informative) Certificate trust list (CTL) design and electors
L.1 Policy assumptions
L.2 Comparison of IEEE CTL and ETSI CTL <\/td>\n<\/tr>\n
257<\/td>\nL.3 Comparison of IEEE CTL and Crash Avoidance Metrics Partners LLC (CAMP) elector ballots
L.4 Electors across multiple regions and domains <\/td>\n<\/tr>\n
259<\/td>\nAnnex M (normative) Registered values for CtlSeriesId and AcpcTreeId
M.1 CtlSeriesId
M.2 AcpcTreeId <\/td>\n<\/tr>\n
260<\/td>\nAnnex N (informative) Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard for Wireless Access in Vehicular Environments (WAVE) – Certificate Management Interfaces for End Entities<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2022<\/td>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":407569,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-407560","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/407560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/407569"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=407560"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=407560"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=407560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}