{"id":407560,"date":"2024-10-20T05:26:39","date_gmt":"2024-10-20T05:26:39","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-1609-2-1-2022\/"},"modified":"2024-10-26T09:53:52","modified_gmt":"2024-10-26T09:53:52","slug":"ieee-1609-2-1-2022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-1609-2-1-2022\/","title":{"rendered":"IEEE 1609.2.1-2022"},"content":{"rendered":"
Revision Standard – Active. Certificate management protocols are specified in this document to support provisioning and management of digital certificates, as specified in IEEE Std 1609.2(TM), to end entities, that is, an actor that uses digital certificates to authorize application activities<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Std 1609.2.1\u2122-2022 Front cover <\/td>\n<\/tr>\n | ||||||
2<\/td>\n | Title page <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Important Notices and Disclaimers Concerning IEEE Standards Documents Notice and Disclaimer of Liability Concerning the Use of IEEE Standards Documents Translations <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | Official statements Comments on standards Laws and regulations Data privacy Copyrights <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Photocopies Updating of IEEE Standards documents Errata Patents <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | IMPORTANT NOTICE <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 1. Overview 1.1 Scope 1.2 Purpose 1.3 Word usage <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 2. Normative references <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 3. Definitions, acronyms, and abbreviations 3.1 Definitions <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 3.2 Acronyms and abbreviations <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 4. Architecture 4.1 Security Credential Management System (SCMS) 4.1.1 General <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 4.1.2 Supported interfaces 4.1.2.1 General 4.1.2.2 ACA\u2013EE interface 4.1.2.3 DC\u2013EE interface <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 4.1.2.4 ECA\u2013EE interface 4.1.2.5 EE\u2013MA interface 4.1.2.6 EE\u2013RA interface 4.1.2.7 EE\u2013SAS interface <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 4.1.3 Types of enrollment certificate 4.1.4 Assumed lifecycle and use cases 4.1.4.1 General <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 4.1.4.2 Initial enrollment certificate request\/download <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 4.1.4.3 Use cases authenticated with the enrollment certificate <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 4.1.4.4 Use cases authorized with authorization certificate\u2014Misbehavior report submission 4.1.4.5 Use cases that may be authorized with enrollment certificate or may be unauthorized <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 4.1.5 Misbehavior authorities <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 4.1.6 Composite CRL 4.1.6.1 General 4.1.6.2 CRL download <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 4.1.7 Certificate chain files 4.1.8 Elector and root certificate authority management <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 4.2 Interface approach <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 4.3 System parameters 4.3.1 General 4.3.2 Time period parameters 4.3.2.1 General <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 4.3.2.2 Parameter mapping 4.3.2.3 Parameter usage <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 4.3.2.4 Approaches for smooth transition <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 4.3.3 Session parameters 4.3.4 Web API parameters: generic 4.3.5 Web API parameters: SCMS REST API v3 <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 4.3.6 Use case related parameters <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 5. Secure session 5.1 General 5.1.1 General 5.1.2 SCMS component authentication 5.1.3 End entity authentication <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 5.2 Physical security 5.2.1 General 5.2.2 Protocol parameters 5.3 Transport Layer Security (TLS) 5.3.1 Prerequisites 5.3.1.1 General <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 5.3.1.2 SCMS component certificate and certificate acceptance policy 5.3.1.3 Root CA certificate 5.3.1.4 OCSP support 5.3.2 Protocol constraints <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 5.3.3 Protocol options 5.3.4 Protocol parameters 5.4 ISO\/TS 21177 5.4.1 Prerequisites 5.4.1.1 General 5.4.1.2 SCMS component certificate and certificate acceptance policy <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 5.4.1.3 Root CA certificate 5.4.2 Protocol constraints 5.4.3 Protocol parameters <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 5.4.4 Client authentication with an enrollment certificate 6. Web API 6.1 General 6.1.1 General 6.1.2 Protocol parameters <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 6.1.3 Hexadecimal encoding of integers 6.2 OAuth 2.0 bearer authorization 6.2.1 General 6.2.2 Protocol flow 6.2.2.1 General <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 6.2.2.2 AT headers 6.2.2.3 AT claims 6.2.2.4 JWKS API <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 6.2.3 OAuth 2.0 AT acceptance policy 6.3 SCMS REST API v3 6.3.1 General 6.3.1.1 Organization of this subclause <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 6.3.1.2 Conventions 6.3.1.3 Protocol parameters <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | 6.3.1.4 HTTP headers 6.3.1.5 Error codes <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | 6.3.1.6 HTTP options 6.3.1.7 Profiles 6.3.2 ACA\u2013EE interface 6.3.3 DC\u2013EE interface <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | 6.3.4 ECA\u2013EE interface 6.3.4.1 General 6.3.4.2 Enrollment certificate request <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 6.3.5 EE\u2013RA interface 6.3.5.1 General 6.3.5.2 Authorization certificate request <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | 6.3.5.3 Authorization certificate download <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | 6.3.5.4 Successor enrollment certificate request <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | 6.3.5.5 Successor enrollment certificate download <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | 6.3.5.6 Misbehavior report submission <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | 6.3.5.7 CCF including CTL download <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 6.3.5.8 Composite CRL including CTL download <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | 6.3.5.9 Individual CA certificate download <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | 6.3.5.10 Individual CRL download <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | 6.3.5.11 CTL download <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | 6.3.5.12 RA certificate download <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | 6.3.5.13 MA certificate download <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | 6.3.5.14 Certificate management information status download <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | 7. Data structures\u2014Abstract Syntax Notation 1 (ASN.1) 7.1 Presentation and encoding 7.2 Data structures from IEEE Std 1609.2 7.2.1 General 7.2.2 BasePublicEncryptionKey 7.2.3 BitmapSsp 7.2.4 BitmapSspRange 7.2.5 Certificate <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | 7.2.6 CertificateId 7.2.7 CertificateType 7.2.8 CrlSeries 7.2.9 Duration 7.2.10 EccP256CurvePoint 7.2.11 EccP384CurvePoint 7.2.12 EcdsaP256Signature 7.2.13 EcdsaP384Signature 7.2.14 EncryptedData 7.2.15 GeographicRegion 7.2.16 HashAlgorithm 7.2.17 HashedId3 7.2.18 HashedId8 <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | 7.2.19 HashedId10 7.2.20 Hostname 7.2.21 Ieee1609Dot2Data 7.2.22 IValue 7.2.23 LaId 7.2.24 LinkageData 7.2.25 PKRecipientInfo 7.2.26 Psid 7.2.27 PsidGroupPermissions 7.2.28 PsidSspRange 7.2.29 PublicEncryptionKey 7.2.30 SecuredCrl 7.2.31 SequenceOfCertificate <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | 7.2.32 SequenceOfPsidGroupPermissions 7.2.33 SequenceOfPsidSsp 7.2.34 SignedData 7.2.35 SignerIdentifier 7.2.36 SspRange 7.2.37 SubjectAssurance 7.2.38 Time32 7.2.39 Uint8 7.2.40 Uint16 7.2.41 ValidityPeriod 7.2.42 VerificationKeyIndicator 7.3 SCMS protocol data unit structures 7.3.1 General <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | 7.3.2 ScmsPdu 7.3.3 AcaEeInterfacePdu <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | 7.3.4 AcaEeCertResponse 7.3.5 AcaLaInterfacePdu 7.3.6 AcaMaInterfacePdu <\/td>\n<\/tr>\n | ||||||
98<\/td>\n | 7.3.7 AcaRaInterfacePdu 7.3.8 CertManagementPdu 7.3.9 CompositeCrl 7.3.10 CertificateChain <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | 7.3.11 MultiSignedCtl 7.3.12 IEEE-1609-2-1-MSCTL 7.3.13 Ieee1609dot2dot1Ctls <\/td>\n<\/tr>\n | ||||||
100<\/td>\n | 7.3.14 Ieee1609dot2dot1MsctlType 7.3.15 FullIeeeTbsCtl <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | 7.3.16 CtlSeriesId 7.3.17 CtlSequenceNumber 7.3.18 CtlElectorEntry <\/td>\n<\/tr>\n | ||||||
102<\/td>\n | 7.3.19 CtlRootCaEntry 7.3.20 ToBeSignedCtlSignature 7.3.21 CertificateManagementInfoStatus 7.3.22 SequenceOfCtlInfoStatus <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | 7.3.23 CtlInfoStatus 7.3.24 SequenceOfCrlInfoStatus 7.3.25 CrlInfoStatus 7.3.26 SequenceOfMaInfoStatus 7.3.27 MaInfoStatus <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | 7.3.28 EcaEeInterfacePdu 7.3.29 EeEcaCertRequest <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | 7.3.30 EcaEeCertResponse <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | 7.3.31 EeMaInterfacePdu 7.3.32 EeRaInterfacePdu 7.3.33 EeRaCertRequest <\/td>\n<\/tr>\n | ||||||
108<\/td>\n | 7.3.34 AdditionalParams 7.3.35 ButterflyParamsOriginal 7.3.36 ButterflyExpansion 7.3.37 RaEeCertAck <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | 7.3.38 RaEeCertInfo 7.3.39 EeRaDownloadRequest <\/td>\n<\/tr>\n | ||||||
110<\/td>\n | 7.3.40 LaMaInterfacePdu 7.3.41 LaRaInterfacePdu 7.3.42 MaRaInterfacePdu 7.3.43 SecurityMgmtPsid 7.3.44 SignedCertificateRequest <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | 7.3.45 SignedX509CertificateRequest <\/td>\n<\/tr>\n | ||||||
112<\/td>\n | 7.3.46 SignerSelf 7.3.47 SignerSingleCert 7.3.48 SignerSingleX509Cert 7.3.49 SequenceOfX509Certificate 7.3.50 X509Certificate 7.3.51 X509SignerIdentifier <\/td>\n<\/tr>\n | ||||||
113<\/td>\n | 7.4 Secured protocol data unit structures 7.4.1 General 7.4.2 AcaEeCertResponseCubkSpdu 7.4.3 AcaEeCertResponsePlainSpdu 7.4.4 AcaEeCertResponsePrivateSpdu <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | 7.4.5 CertificateChainSpdu 7.4.6 CertificateManagementInformationStatusSpdu 7.4.7 CompositeCrlSpdu <\/td>\n<\/tr>\n | ||||||
116<\/td>\n | 7.4.8 CtlSignatureSpdu 7.4.9 EcaEeCertResponseSpdu 7.4.10 EeEcaCertRequestSpdu <\/td>\n<\/tr>\n | ||||||
117<\/td>\n | 7.4.11 EeRa1609Dot2AuthenticatedCertRequestSpdu 7.4.12 EeRaCertRequestSpdu 7.4.13 EeRaDownloadRequestPlainSpdu 7.4.14 EeRaDownloadRequestSpdu <\/td>\n<\/tr>\n | ||||||
118<\/td>\n | 7.4.15 EeRaSuccessorEnrollmentCertRequestSpdu 7.4.16 EeRaX509AuthenticatedCertRequestSpdu 7.4.17 MultiSignedCtlSpdu 7.4.18 RaEeCertAckSpdu <\/td>\n<\/tr>\n | ||||||
119<\/td>\n | 7.4.19 RaEeCertAndAcpcInfoSpdu 7.4.20 RaEeCertInfoSpdu 7.4.21 RaEeEnrollmentCertAckSpdu <\/td>\n<\/tr>\n | ||||||
120<\/td>\n | 7.5 Parameterized types 7.5.1 General 7.5.2 Ieee1609Dot2Data-Encrypted 7.5.3 Ieee1609Dot2Data-EncryptedSigned 7.5.4 Ieee1609Dot2Data-Signed <\/td>\n<\/tr>\n | ||||||
121<\/td>\n | 7.5.5 Ieee1609Dot2Data-SignedCertRequest 7.5.6 Ieee1609Dot2Data-SignedEncrypted <\/td>\n<\/tr>\n | ||||||
122<\/td>\n | 7.5.7 Ieee1609Dot2Data-SignedEncryptedCertRequest 7.5.8 Ieee1609Dot2Data-SignedX509AuthenticatedCertRequest 7.5.9 Ieee1609Dot2Data-SymmEncryptedSingleRecipient <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | 7.5.10 Ieee1609Dot2Data-Unsecured 7.5.11 ScmsPdu-Scoped 7.5.12 ScopedCertificateRequest <\/td>\n<\/tr>\n | ||||||
124<\/td>\n | 7.6 Certificate profiles 7.6.1 General 7.6.2 Service specific permissions (SSP) 7.6.2.1 General 7.6.2.2 SecurityMgmtSsp <\/td>\n<\/tr>\n | ||||||
125<\/td>\n | 7.6.2.3 AcaSsp 7.6.2.4 CrlSignerSsp 7.6.2.5 DcmSsp 7.6.2.6 EcaSsp 7.6.2.7 EeSsp <\/td>\n<\/tr>\n | ||||||
126<\/td>\n | 7.6.2.8 ElectorSsp 7.6.2.9 IcaSsp 7.6.2.10 LaSsp 7.6.2.11 LopSsp 7.6.2.12 MaSsp <\/td>\n<\/tr>\n | ||||||
127<\/td>\n | 7.6.2.13 PgSsp 7.6.2.14 RaSsp 7.6.2.15 RootCaSsp 7.6.2.16 DcSsp 7.6.3 Certificate profiles for SCMS components and end entities 7.6.3.1 General <\/td>\n<\/tr>\n | ||||||
128<\/td>\n | 7.6.3.2 ACA certificate profile 7.6.3.3 Authorization certificate profile 7.6.3.4 DC certificate profile 7.6.3.5 ECA certificate profile <\/td>\n<\/tr>\n | ||||||
129<\/td>\n | 7.6.3.6 Elector certificate profile 7.6.3.7 Enrollment (IEEE 1609.2) certificate profile 7.6.3.8 Enrollment (ITU-T X.509) certificate profile <\/td>\n<\/tr>\n | ||||||
130<\/td>\n | 7.6.3.9 MA certificate profile 7.6.3.10 RA certificate profile 8. Data structures\u2014files 8.1 General <\/td>\n<\/tr>\n | ||||||
131<\/td>\n | 8.2 Authorization certificate download files 8.2.1 General 8.2.2 Naming convention 8.2.3 File contents 8.2.3.1 Nonbutterfly certificate file contents 8.2.3.2 Butterfly certificate file contents <\/td>\n<\/tr>\n | ||||||
132<\/td>\n | 8.2.4 Validity of certificates in zip files 8.2.4.1 General 8.2.4.2 Correspondence between private key and public key <\/td>\n<\/tr>\n | ||||||
133<\/td>\n | 8.2.4.3 Certificates generated using ACPC 8.3 Successor enrollment certificate download files 8.3.1 General 8.3.2 Naming convention 8.4 Certificate chain files 8.4.1 General 8.4.2 Naming convention <\/td>\n<\/tr>\n | ||||||
134<\/td>\n | 8.5 Composite CRL files 8.5.1 General 8.5.2 Naming convention 8.6 CTL files 8.7 Certificate management information status files 9. Cryptographic constructions 9.1 General 9.1.1 General 9.1.2 Butterfly keys <\/td>\n<\/tr>\n | ||||||
135<\/td>\n | 9.1.3 ACPC 9.2 Butterfly keys and SCMS architecture 9.2.1 General <\/td>\n<\/tr>\n | ||||||
139<\/td>\n | 9.2.2 Relationship to SCMS reference architecture 9.2.3 Alternatives to butterfly key step <\/td>\n<\/tr>\n | ||||||
140<\/td>\n | 9.2.4 Privacy against insiders 9.2.5 Types of butterfly keys <\/td>\n<\/tr>\n | ||||||
141<\/td>\n | 9.3 Butterfly key mechanism 9.3.1 General 9.3.1.1 General 9.3.1.2 Caterpillar key generation 9.3.1.3 Cocoon key derivation <\/td>\n<\/tr>\n | ||||||
142<\/td>\n | 9.3.1.4 Butterfly key derivation 9.3.2 Notation 9.3.3 Caterpillar keypair generation <\/td>\n<\/tr>\n | ||||||
143<\/td>\n | 9.3.3.1 Butterfly expansion functions <\/td>\n<\/tr>\n | ||||||
144<\/td>\n | 9.3.4 Cocoon key derivation 9.3.4.1 Cocoon private key derivation 9.3.4.2 Cocoon public key derivation <\/td>\n<\/tr>\n | ||||||
145<\/td>\n | 9.3.5 Butterfly key derivation 9.3.5.1 Butterfly private key derivation 9.3.5.2 Butterfly public key derivation <\/td>\n<\/tr>\n | ||||||
146<\/td>\n | 9.3.6 Certificate request, and response validity, with butterfly keys 9.3.6.1 General 9.3.6.2 Certificate request without butterfly key mechanism 9.3.6.3 Certificate request using the original butterfly key mechanism <\/td>\n<\/tr>\n | ||||||
147<\/td>\n | 9.3.6.4 Certificate request using the unified butterfly key mechanism 9.3.6.5 Certificate request using the compact unified butterfly key mechanism <\/td>\n<\/tr>\n | ||||||
148<\/td>\n | 9.4 ACPC and SCMS architecture 9.4.1 General <\/td>\n<\/tr>\n | ||||||
150<\/td>\n | 9.4.2 Operations <\/td>\n<\/tr>\n | ||||||
151<\/td>\n | 9.4.3 Terminology 9.4.4 ACPC and butterfly keys 9.5 Binary hash tree for ACPC activation codes 9.5.1 Binary hash tree\u2014background <\/td>\n<\/tr>\n | ||||||
153<\/td>\n | 9.5.2 Calculating child node values from parent node values 9.5.2.1 Hash function output and APrV\/APuV derivation 9.5.2.2 AprvHashCalculationInput 9.5.2.3 AcpcTreeId <\/td>\n<\/tr>\n | ||||||
154<\/td>\n | 9.5.2.4 AcpcNodeValue 9.5.3 Use of APrVs and APuVs within certificate generation 9.5.3.1 Butterfly keys <\/td>\n<\/tr>\n | ||||||
155<\/td>\n | 9.5.3.2 ACPC without butterfly keys 9.5.4 Encoding of APrVs 9.5.4.1 Data structures and encoding <\/td>\n<\/tr>\n | ||||||
157<\/td>\n | 9.5.4.2 Encoding\/decoding of binary tree node present\/absent information <\/td>\n<\/tr>\n | ||||||
161<\/td>\n | 9.5.5 CAM certificate 9.5.5.1 AcpcSsp <\/td>\n<\/tr>\n | ||||||
162<\/td>\n | 9.5.5.2 CamSsp 9.5.6 Distribution of APrVs <\/td>\n<\/tr>\n | ||||||
163<\/td>\n | 10. Validity conditions for particular SPDUs 10.1 Validity of SignedCertificateRequest 10.1.1 General 10.1.2 Common validity conditions <\/td>\n<\/tr>\n | ||||||
164<\/td>\n | 10.1.3 Initial (self-signed) enrollment certificate requests 10.1.4 Successor enrollment certificate requests 10.1.4.1 General <\/td>\n<\/tr>\n | ||||||
165<\/td>\n | 10.1.4.2 Consistency between requested and requesting certRequestPermissions 10.1.4.3 Consistency between requested and requesting SspRanges <\/td>\n<\/tr>\n | ||||||
168<\/td>\n | 10.1.5 Authorization certificate requests signed by 1609.2 enrollment certificates 10.1.5.1 General <\/td>\n<\/tr>\n | ||||||
169<\/td>\n | 10.1.5.2 Authorization certificate requests with butterfly keys 10.1.6 Authorization certificate requests without butterfly keys 10.1.7 Consistency between appPermissions in a request and certRequestPermissions in an IEEE 1609.2 enrollment certificate 10.1.7.1 General 10.1.7.2 Atomic PsidSsp <\/td>\n<\/tr>\n | ||||||
172<\/td>\n | 10.1.8 Consistency between an authorization certificate request and an ITU-T X.509 enrollment certificate 10.2 Validity of multisigned CTLs 10.2.1 General 10.2.2 Validity of a CTL 10.2.3 Validity of a CtlSignatureSpdu <\/td>\n<\/tr>\n | ||||||
173<\/td>\n | 10.2.4 Requirements for the IEEE 1609.2 security services management entity 10.2.5 Updating the quorum value 11. Extensions and modifications of IEEE Std 1609.2 11.1 General <\/td>\n<\/tr>\n | ||||||
174<\/td>\n | 11.2 Extensions and modifications of, and new data structures for, IEEE\u00a0Std\u00a01609.2 11.2.1 General 11.2.2 Additional cryptographic algorithms 11.2.3 Ieee1609Dot2Content 11.2.4 EccP384CurvePoint 11.2.5 HashedId32 <\/td>\n<\/tr>\n | ||||||
175<\/td>\n | 11.2.6 HashedId48 11.2.7 Signature 11.2.8 ToBeSignedCertificate <\/td>\n<\/tr>\n | ||||||
176<\/td>\n | 11.2.9 PublicVerificationKey 11.3 Identification of encoded data structures by their hash value 11.3.1 General 11.3.2 Canonicalization 11.3.3 Data objects identified by HashedIdX 11.3.3.1 General <\/td>\n<\/tr>\n | ||||||
177<\/td>\n | 11.3.3.2 Additional purposes of HashedIdX 11.3.3.3 Whole-certificate hash <\/td>\n<\/tr>\n | ||||||
178<\/td>\n | 11.3.3.4 PreSharedKeyRecipientInfo 11.3.3.5 SymmRecipientInfo 11.3.4 PKRecipientInfo 11.3.5 tbsCtlHash in ToBeSignedCtlSignature <\/td>\n<\/tr>\n | ||||||
179<\/td>\n | Annex A (normative) Protocol Implementation Conformance Statement (PICS) proforma A.1 Instructions for completing the PICS proforma <\/td>\n<\/tr>\n | ||||||
181<\/td>\n | A.2 PICS proforma\u2014IEEE Std 1609.2.1 <\/td>\n<\/tr>\n | ||||||
208<\/td>\n | Annex B (normative)ASN.1 modules B.1 General B.2 Ieee1609Dot2Dot1AcaEeInterface.asn B.3 Ieee1609Dot2Dot1AcaLaInterface.asn B.4 Ieee1609Dot2Dot1AcaMaInterface.asn <\/td>\n<\/tr>\n | ||||||
209<\/td>\n | B.5 Ieee1609Dot2Dot1AcaRaInterface.asn B.6 Ieee1609Dot2Dot1Acpc.asn B.7 Ieee1609Dot2Dot1CamRaInterface.asn B.8 Ieee1609Dot2Dot1CertManagement.asn B.9 Ieee1609Dot2Dot1EcaEeInterface.asn B.10 Ieee1609Dot2Dot1EeMaInterface.asn <\/td>\n<\/tr>\n | ||||||
210<\/td>\n | B.11 Ieee1609Dot2Dot1EeRaInterface.asn B.12 Ieee1609Dot2Dot1LaMaInterface.asn B.13 Ieee1609Dot2Dot1LaRaInterface.asn B.14 Ieee1609Dot2Dot1MaRaInterface.asn B.15 Ieee1609Dot2Dot1Protocol.asn <\/td>\n<\/tr>\n | ||||||
211<\/td>\n | B.16 Ieee1609Dot2Asn\/Ieee1609Dot2.asn B.17 Ieee1609Dot2Asn\/Ieee1609Dot2BaseTypes.asn B.18 Ieee1609Dot2Asn\/Ieee1609Dot2Crl.asn B.19 Ieee1609Dot2Asn\/Ieee1609Dot2CrlBaseTypes.asn B.20 Ieee1609Dot2Asn\/Ieee1609Dot2HeaderInfoExtensionBase.asn B.21 Ieee1609Dot2Asn\/EtsiTs103097ExtensionModule.asn <\/td>\n<\/tr>\n | ||||||
212<\/td>\n | Annex C (informative)Implementation profiles C.1 General C.2 Profile template <\/td>\n<\/tr>\n | ||||||
213<\/td>\n | C.3 Additional information <\/td>\n<\/tr>\n | ||||||
214<\/td>\n | C.4 Use case specific profile contents <\/td>\n<\/tr>\n | ||||||
216<\/td>\n | Annex D (informative) Intermediate certificate authority (ICA) certificate profile <\/td>\n<\/tr>\n | ||||||
217<\/td>\n | Annex E (informative) Example encodings of certificate profiles E.1 General E.2 Authorization certificate authority (ACA) certificate <\/td>\n<\/tr>\n | ||||||
218<\/td>\n | E.3 Distribution Center (DC) certificate E.4 Enrollment certificate authority (ECA) certificate <\/td>\n<\/tr>\n | ||||||
220<\/td>\n | E.5 Elector certificate E.6 Enrollment certificate <\/td>\n<\/tr>\n | ||||||
221<\/td>\n | E.7 Intermediate certificate authority (ICA) certificate <\/td>\n<\/tr>\n | ||||||
222<\/td>\n | E.8 Misbehavior authority (MA) certificate <\/td>\n<\/tr>\n | ||||||
223<\/td>\n | E.9 Registration authority (RA) certificate <\/td>\n<\/tr>\n | ||||||
225<\/td>\n | Annex F (informative)Privacy-preserving generation of linkage values with two linkage authorities F.1 General F.2 Details of the approach <\/td>\n<\/tr>\n | ||||||
227<\/td>\n | F.3 Properties of the approach <\/td>\n<\/tr>\n | ||||||
228<\/td>\n | F.4 Details that are out of scope <\/td>\n<\/tr>\n | ||||||
229<\/td>\n | Annex G (informative) Authorization certificate authority (ACA)\u2013registration authority (RA) interface G.1 General G.2 AcaRaInterfacePdu G.3 RaAcaCertRequest <\/td>\n<\/tr>\n | ||||||
231<\/td>\n | G.4 RaAcaCertRequestFlags G.5 LinkageInfo G.6 EncryptedIndividualPLV G.7 PreLinkageValue <\/td>\n<\/tr>\n | ||||||
232<\/td>\n | G.8 AcaRaCertResponse G.9 AcaResponse G.10 RaAcaCertRequestSpdu <\/td>\n<\/tr>\n | ||||||
233<\/td>\n | G.11 AcaRaCertResponseSpdu <\/td>\n<\/tr>\n | ||||||
234<\/td>\n | Annex H (informative)Certificate access manager (CAM)\u2013registration authority (RA) interface H.1 General H.2 CamRaInterfacePdu H.3 RaCamBatchRequest H.4 CamRaBatchResponse <\/td>\n<\/tr>\n | ||||||
235<\/td>\n | H.5 CamRaBatchResponse <\/td>\n<\/tr>\n | ||||||
236<\/td>\n | Annex I (informative)Mapping enrollment certificate permissions to authorization certificate permissions I.1 General <\/td>\n<\/tr>\n | ||||||
237<\/td>\n | I.2 ETSI model support <\/td>\n<\/tr>\n | ||||||
238<\/td>\n | Annex J (informative) Root certificate authority (CA) management and failure recovery J.1 Elector replacement <\/td>\n<\/tr>\n | ||||||
243<\/td>\n | J.2 Revoking a root CA certificate <\/td>\n<\/tr>\n | ||||||
246<\/td>\n | J.3 Adding a root CA certificate <\/td>\n<\/tr>\n | ||||||
252<\/td>\n | Annex K (informative) Network communications architecture K.1 General <\/td>\n<\/tr>\n | ||||||
255<\/td>\n | K.2 Location obscurer proxy <\/td>\n<\/tr>\n | ||||||
256<\/td>\n | Annex L (informative) Certificate trust list (CTL) design and electors L.1 Policy assumptions L.2 Comparison of IEEE CTL and ETSI CTL <\/td>\n<\/tr>\n | ||||||
257<\/td>\n | L.3 Comparison of IEEE CTL and Crash Avoidance Metrics Partners LLC (CAMP) elector ballots L.4 Electors across multiple regions and domains <\/td>\n<\/tr>\n | ||||||
259<\/td>\n | Annex M (normative) Registered values for CtlSeriesId and AcpcTreeId M.1 CtlSeriesId M.2 AcpcTreeId <\/td>\n<\/tr>\n | ||||||
260<\/td>\n | Annex N (informative) Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard for Wireless Access in Vehicular Environments (WAVE) – Certificate Management Interfaces for End Entities<\/b><\/p>\n |