ISO 14906-2011 ETC 应用层
ISO 14906-2011 ETC 应用层
STANDARD 14906
Second edition
2011-10-15
Reference number
ISO 14906:2011(E)
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
ii
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
Contents Page
Foreword ............................................................................................................................................................ iv
Introduction ......................................................................................................................................................... v
1 Scope ...................................................................................................................................................... 1
2 Normative references ............................................................................................................................ 2
3 Terms and definitions ........................................................................................................................... 2
4 Abbreviated terms ................................................................................................................................. 5
5 EFC application interface architecture................................................................................................ 7
5.1 Relation to the DSRC communication architecture ........................................................................... 7
5.2 Usage of DSRC application layer by the EFC application interface ................................................ 9
5.3 Addressing of EFC attributes ............................................................................................................... 9
5.4 Addressing of components ................................................................................................................ 11
6 EFC Transaction Model....................................................................................................................... 12
6.1 General ................................................................................................................................................. 12
6.2 Initialisation Phase .............................................................................................................................. 12
6.3 Transaction phase ............................................................................................................................... 15
7 EFC Functions ..................................................................................................................................... 17
7.1 Overview and general concepts ........................................................................................................ 17
7.2 EFC functions ...................................................................................................................................... 21
8 EFC Attributes ..................................................................................................................................... 34
8.1 General ................................................................................................................................................. 34
8.2 Data group CONTRACT ...................................................................................................................... 36
8.3 Data group RECEIPT ........................................................................................................................... 36
8.4 Data group VEHICLE ........................................................................................................................... 36
8.5 Data group EQUIPMENT ..................................................................................................................... 37
8.6 Data group DRIVER ............................................................................................................................. 37
8.7 Data group PAYMENT ......................................................................................................................... 37
Annex A (normative) EFC data type specifications ...................................................................................... 51
Annex B (informative) CARDME transaction.................................................................................................. 67
Annex C (informative) Examples of EFC transaction types ......................................................................... 93
Annex D (informative) Functional requirements .......................................................................................... 103
Annex E (normative) Mapping table from LatinAlphabetNo2 & 5 to LatinAlphabetNo1.......................... 110
Annex F (informative) Mapping table between EFC Vehicledata attribute and European
registration certificate ....................................................................................................................... 111
Bibliography .................................................................................................................................................... 113
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards bodies
(ISO member bodies). The work of preparing International Standards is normally carried out through ISO
technical committees. Each member body interested in a subject for which a technical committee has been
established has the right to be represented on that committee. International organizations, governmental and
non-governmental, in liaison with ISO, also take part in the work. ISO collaborates closely with the
International Electrotechnical Commission (IEC) on all matters of electrotechnical standardization.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of technical committees is to prepare International Standards. Draft International Standards
adopted by the technical committees are circulated to the member bodies for voting. Publication as an
International Standard requires approval by at least 75 % of the member bodies casting a vote.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO shall not be held responsible for identifying any or all such patent rights.
ISO 14906 was prepared by Technical Committee ISO/TC 204, Intelligent transport systems, in collaboration
with Technical Committee CEN/TC 278, Road transport and traffic telematics.
This second edition cancels and replaces the first edition (ISO 14906:2004), which has been technically
revised.
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
iv
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
Introduction
This International Standard specifies an application interface for electronic fee collection (EFC) systems,
which are based on dedicated short-range communication (DSRC). It supports interoperability between EFC
systems on an EFC-DSRC application interface level. This International Standard is intended for DSRC
charging applications, but specifically the definition of EFC data elements is valid beyond the use of a DSRC
charging interface and might be used for other DSRC applications (e.g. compliance checking communication)
and/or on other interfaces (e.g. the application interface of autonomous systems).
This International Standard provides specifications for the EFC transaction model, EFC data elements
(referred to as attributes) and functions, from which an EFC transaction can be built. The EFC transaction
model provides a mechanism that allows handling of different versions of EFC transactions and associated
contracts. A certain EFC transaction supports a certain set of EFC attributes and EFC functions as defined in
this International Standard. It is not envisaged that the complete set of EFC attributes and functions be
present in each piece of EFC equipment, on-board equipment (OBE) or roadside equipment (RSE).
This International Standard provides the basis for agreements between operators, which are needed to
achieve interoperability. Based on the tools specified in this International Standard, interoperability can be
reached by operators recognising each others' EFC transactions (including the exchange of security
algorithms and keys) and implementing the EFC transactions in each others' RSEs, or they can reach an
agreement to define a new transaction (and contract) that is common to both. Considerations should also be
made by each operator so that the RSE has sufficient resources to implement such additional EFC
transactions.
operational issues, such as how many receipts may be stored for privacy reasons, how many receipts are
necessary for operational reasons (for example as entry tickets or as proof of payment),
the agreements needed between operators in order to regulate the handling of different EFC transactions.
In this revision, users are faced with issues related to backward compatibility. This issue can be managed by
using the following:
Efc-ContextMark (incl. the ContextVersion), denoting the implementation version, provides a means to
ensure co-existence of different implementation versions by means of a look-up table and associated
appropriate transaction processing. This will enable the software of the RSE to determine the version of
the OBE and his capabilty to accept the new features of this version of this International Standard.
Annex A provides the normative ASN.1 specifications of the used data types (EFC action parameters and
attributes).
Annex B presents an informative example of a transaction based on the CARDME specification, including
bit-level specification.
Annex C presents informative examples of EFC transaction types, using the specified EFC functions and
attributes.
Annex D presents an informative listing of functional requirements, which can be satisfied by using the tools
provided by this International Standard.
Annex E presents an informative mapping table from LatinAlphabetNo2 & 5 to LatinAlphabetNo1 to ease for a
Service Provider the use of LatinAlphabetNo1 to encode an OBE for data available wiitten with non-Latin1
characters.
Annex F presents an informative mapping table between EFC vehicle data attributes and European
registration certificates to ease the task of a service provider when he needs to personalise an OBE by
obtaining vehicle data.
This application interface definition can also be used with other DSRC media which do not use a layer 7
according to ISO 15628/EN 12834. Any DSRC medium which provides services to read and write data, to
initialise communication and to perform actions is suitable to be used as a basis for this application interface.
Adaptations are medium specific and are not further covered here. As Annex B describes in detail a
transaction for central account systems, this International Standard can also be used for onboard account
systems, in conjunction with ISO/TS 25110, which provides examples of systems based on onboard accounts.
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
vi
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
INTERNATIONAL STANDARD ISO 14906:2011(E)
1 Scope
This International Standard specifies the application interface in the context of electronic fee collection (EFC)
systems using the dedicated short-range communication (DSRC).
The EFC application interface is the EFC application process interface to the DSRC application layer, as can
be seen in Figure 1 below. This International Standard comprises specifications of
EFC attributes (i.e. EFC application information) that can also be used for other applications and/or
interfaces,
the addressing procedures of EFC attributes and (hardware) components (e.g. ICC and MMI),
EFC application functions, i.e. further qualification of actions by definitions of the concerned services,
assignment of associated ActionType values and content and meaning of action parameters,
the EFC transaction model, which defines the common elements and steps of any EFC transaction,
the behaviour of the interface so as to ensure interoperability on an EFC-DSRC application interface level.
RSE OBE
Attributes Attributes
(e.g. PaymentMeans, (e.g. PaymentMeans,
VehicleDimensions, …) ADU VehicleDimensions, …)
ActionType (e.g. debit, ActionType (e.g. debit,
set_MMI, transfer_channel, …) set_MMI, transfer_channel, …)
Kernel
This is an interface standard, adhering to the open systems interconnection (OSI) philosophy (see
ISO/IEC 7498-1), and it is as such not concerned with the implementation choices to be realised at either side
of the interface.
This International Standard provides security-specific functionality as place holders (data and functions) to
enable the implementation of secure EFC transactions. Yet the specification of the security policy (including
specific security algorithms and key management) remains at the discretion and under the control of the EFC
operator, and hence is outside the scope of this International Standard.
2 Normative references
The following referenced documents are indispensable for the application of this document. For dated
references, only the edition cited applies. For undated references, the latest edition of the referenced
document (including any amendments) applies.
ISO 612, Road vehicles — Dimensions of motor vehicles and towed vehicles — Terms and definitions
ISO 3166-1, Codes for the representation of names of countries and their subdivisions — Part 1: Country
codes
ISO 3779, Road vehicles — Vehicle identification number (VIN) — Content and structure
ISO/IEC 8824-1, Information technology — Abstract Syntax Notation One (ASN.1): Specification of basic
notation
ISO/IEC 8825-2, Information technology — ASN.1 encoding rules: Specification of Packed Encoding Rules
(PER)
ISO 14816:2005, Road transport and traffic telematics — Automatic vehicle and equipment identification —
Numbering and data structure
ISO 15628:2007, Road transport and traffic telematics — Dedicated short range communication (DSRC) —
DSRC application layer
EN 12834:2003, Road transport and traffic telematics — Dedicated Short Range Communication (DSRC) —
DSRC application layer
3.1
access credentials
data that is transferred to on-board equipment (OBE), in order to establish the claimed identity of a roadside
equipment (RSE) application process entity
NOTE The access credentials carry information needed to fulfil access conditions in order to perform the operation
on the addressed element in the OBE. The access credentials can carry passwords as well as cryptographic based
information such as authenticators.
3.2
action
function that an application process resident at the roadside equipment can invoke in order to make the on-
board equipment (OBE) execute a specific operation during the transaction
2
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
3.3
attribute
application information formed by one or by a sequence of data elements, and that is managed by different
actions used for implementation of a transaction
3.4
authenticator
data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to
prove the source and/or the integrity of the data unit and protect against forgery
3.5
channel
information transfer path
3.6
component
logical and physical entity composing an on-board equipment, supporting a specific functionality
3.7
contract
expression of an agreement between two or more parties concerning the use of the road infrastructure
3.8
cryptography
discipline which embodies principles, means, and methods for the transformation of data in order to hide its
information content, prevent its undetected modification and/or prevent its unauthorised use
3.9
data group
collection of closely related EFC data attributes which together describe a distinct part of an EFC transaction
3.10
data integrity
property that data has not been altered or destroyed in an unauthorised manner
3.11
element
¢DSRC² directory containing application information in the form of attributes
3.12
empty list
container for attributeValues (OCTET STRING) with the length equal to zero
3.13
on-board equipment
equipment fitted within or on the outside of a vehicle and used for toll purposes
3.14
on-board unit
minimum component of an on-board equipment, whose functionality always includes at least the support of
the DSRC interface
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
3.15
operator
entity involved in the process outside the user
NOTE An operator is a generic term which can be used for a toll service provider or a toll charger.
3.16
roadside equipment
equipment located along the road transport network, for the purpose of communication and data exchanges
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
with on-board equipment
3.17
service
¢EFC² road transport related facility provided by a service provider, normally a type of infrastructure, the use of
which is offered to the user, for which the user may be requested to pay
3.18
service primitive
¢communication² elementary communication service provided by the application layer protocol to the
application processes
NOTE The invocation of a service primitive by an application process implicitly calls upon and uses services offered
by the lower protocol layers.
3.19
session
exchange of information and interaction occurring at a specific EFC station between the roadside equipment
and the user/vehicle
3.20
toll charger
legal entity charging toll for vehicles in a toll domain
3.21
toll domain
area or part of a road network where a toll regime is applied
3.22
toll service
¢EFC² service enabling users having only one contract and one set of on-board equipment (OBE) to use a
vehicle in one or more toll domains
NOTE Adapted from ISO/TS 12813:2009.
3.23
toll service provider
¢EFC² legal entity providing to his customers toll services on one or more toll domains for one or more classes
of vehicle
NOTE 1 In other documents the terms issuer or contract issuer may be used.
NOTE 2 The toll service provider may provide the OBE or may provide only a magnetic card or a smart card to be used
with OBE provided by a third party (like a mobile telephone and a SIM card can be obtained from different parties).
NOTE 3 The toll service provider is responsible for the operation (functioning) of the OBE.
4
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
3.24
transaction
whole of the exchange of information between the roadside equipment and the on-board equipment
necessary for the completion of an EFC operation over the DSRC
3.25
transaction model
functional model describing the general structure of electronic payment fee collection transactions
3.26
user
customer of a toll service provider, one liable for toll, the owner of the vehicle, a fleet operator, a driver, etc.,
depending on the context
4 Abbreviated terms
For the purposes of this document, the following abbreviated terms apply unless otherwise specified.
4.1
APDU
Application Protocol Data Unit
4.2
AP
Application Process
4.3
ASN.1
Abstract Syntax Notation One (ISO/IEC 8824-1)
4.4
BST
Beacon Service Table
4.5
CCC
Compliance check communication
4.6
cf
Confirm
4.7
DSRC
Dedicated Short-Range communication
4.8
EID
Element Identifier
4.9
EFC
Electronic Fee Collection
4.10
GPS
Global Positioning System
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
4.11
ICC
Integrated Circuit(s) Card
4.12
I-Kernel
Initialisation Kernel
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
4.13
IID
Invoker Identifier
4.14
ind
Indication
4.15
LAC
Localisation Augmentation Communication
4.16
L1
Layer 1 of DSRC (Physical Layer)
4.17
L2
Layer 2 of DSRC (Data Link Layer)
4.18
L7
Application Layer Core of DSRC
4.19
LID
Logical Link Control Identifier
4.20
LLC
Logical Link Control
4.21
LPDU
LLC Protocol Data Unit
4.22
MAC
Medium Access Control
4.23
MMI
Man-Machine Interface
4.24
n.a.
Not applicable
4.25
OBE
On-Board Equipment
6
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
4.26
PDU
Protocol Data Unit
4.27
PER
Packed Encoding Rules (ISO/IEC 8825-2)
4.28
req
Request
4.29
rs
Response
4.30
RSE
Roadside Equipment
4.31
RTTT
Road Transport and Traffic Telematics
4.32
SAM
Secure Application Module
4.33
T-APDU
Transfer-Application Protocol Data Unit
4.34
T-ASDU
Transfer-Application Service Data Unit
4.35
T-Kernel
Transfer Kernel
4.36
VST
Vehicle Service Table
The DSRC services are provided to an application process by means of the DSRC Application Layer service
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
primitives, which are abstract implementation interactions between a communication service user and a
provider. The services are offered by the DSRC communication entities by means of its DSRC Application
Layer (EN 12834/ISO 15628).
RSU OBU
AP ADU AP
NotifyApplicationRSU NotifyApplicationOBU
GET GET
SET SET
ACTION EndApplication ACTION RegisterApplicationOBU
RegisterApplicationRSU .response .indication DeregisterApplication
.request .confirm
DeregisterApplication EndApplication
Figure 2 — The EFC application process on top of the DSRC communication stack
The Transfer Kernel of DSRC Application Layer offers the following services to application processes (see
also Figure 2 above):
GET: The invocation of a GET service request results in retrieval (i.e. reading) of application information
(i.e. Attributes) from the peer service user (i.e. the OBE application process), a reply is always expected.
SET: The invocation of a SET service request results in modification (i.e. writing) of application
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
information (i.e. Attributes) of the peer service user (i.e. the OBE application process). This service may
be requested in confirmed or non-confirmed mode, a reply is only expected in the former case.
ACTION: The invocation of an ACTION service request results in a performance of an action by the peer
service user (i.e. the OBE application process). An action is further qualified by the value of the
ActionType. This service may be requested in confirmed or non-confirmed mode, a reply is only expected
in the former case.
8
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
EFC uses the following services offered by DSRC Application Layer (as defined in EN 12834/ISO 15628):
are used to realise the EFC-specific initialisation mechanism (see Clause 6);
The GET service is used to retrieve EFC attributes (For attribute specifications see Clause 8);
The ACTION services are applied to realise additional EFC specific functionality needed to support EFC
application processes, such as TRANSFER_CHANNEL, SET_MMI and ECHO (see 7.2).
In the following, the EFC-specific usage of the DSRC Layer 7 services is specified in detail.
NOTE The EVENT-REPORT-service can be implicitly used by EFC application processes. It is e.g. used indirectly as
part of an already defined command to release an application process (see EN 12834/ISO 15628, Ready Application).
However as the EVENT-REPORT-service is not explicitly used by EFC application processes, this service is not further
referred to in this International Standard.
EFC Attributes are composed of one or more data elements of specified ASN.1 types. Each data element is
associated with, within the context of this International Standard, an unambiguous name.
To each EFC Attribute, an AttributeID is associated. The AttributeId enables to unambiguously identify and
address an EFC Attribute.
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
ContractAuthenticator ::=
In a given OBE, the DSRC-EID (different from 0) is used to address an EFC context, identified by the
EFC-ContextMark (see 6.2.3), in which Attributes can be addressed unambiguously by AttributeIDs inside an
Element of the OBE. In the VST, the OBE specifies one or several of these EFC contexts, each corresponding
to an EFC ContextMark and the EID to be used for addressing the attributes and using the EFC functions
supported by it.
EXAMPLE
EID equals 0 shall be used to address application-independent functions and components, e.g. SET_MMI and
TRANSFER_CHANNEL (see 7.2).
The maximum number of instances Nmax of one Attribute may be limited according to the needs of operators
and users. The default maximum number of instances is Nmax=1. The value of Nmax is determined at the time of
OBE configuration.
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
10
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
EXAMPLE
ReceiptServicePart 2
EID = 1 ………. ReceiptServicePart 1 ……….
ReceiptServicePart 0
The handling of multiple instances and the corresponding addressing mechanism are described in detail as
part of the behaviour specification of the corresponding functions supporting multiple instances (see 7.2.6 for
GET_INSTANCE and 7.2.7 for SET_INSTANCE).
Components of an OBE to be addressed via the EFC Application Interface include for example:
— OBU;
— SAM 1;
— SAM 2;
— ICC;
— Display;
— Buzzer;
— Printer;
— Serial interface;
— Parallel interface;
— GPS;
— Tachograph;
— Bluetooth.
Addressing of these components is enabled on two levels, device-specific and device-independent addressing.
The device-specific transparent addressing mechanism enables the transfer of information, which shall be
processed by the addressed device (such as an ICC-command). The addressed device is identified by a
channel Id. The EFC function TRANSFER_CHANNEL (see 7.2.10) supports this functionality.
The device-independent addressing mechanism uses a set of commands, which describe a certain
functionality, which can be performed by various OBE components. In this case, the operating system of the
OBE will address the corresponding components. The EFC function SET_MMI supports this functionality
(see 7.2.12).
EXAMPLE 2 Invocation of a SET_MMI(EID=0, ContactOperator) function activates an OBE MMI-device, e.g. a buzzer
or a display.
NOTE In a specific implementation, specific attributes or data elements may activate some MMI function (e.g. a SET
command on the attribute ReceiptText might display the text on an LCD display. A SET command on the attribute
ReceiptServicePart with data element SessionResultOperational other than SessionOK might activate an alert beep).
Proprietary addressing mechanisms are not defined by this International Standard.
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
6.1 General
The EFC Transaction Model related to the EFC Application Interface for the DSRC comprises two phases, the
initialisation phase and the transaction phase.
NOTE The purpose of the initialisation phase is to set up the communication between the RSE and OBEs that have
entered the DSRC zone but have not yet established communication with the RSE, and to notify the application processes.
It provides amongst others a multi-application switching mechanism, allowing for execution of several RTTT applications
(in parallel) at one RSE station.
The transaction phase can only be reached after completion of the initialisation phase. The EFC functions, as
defined in Clause 7, can be performed in the transaction phase. The GET and SET services (DSRC
application layer functions) as defined in EN 12834/ISO 15628 (in 6.2) may also be used in an EFC
transaction phase.
6.2.1 Overview
This clause provides an overview of the functionality of, and the information exchanges in, the initialisation
phase.
The Initialisation procedures, by means of beacon service table (BST) and vehicle service table (VST)
exchanges, are defined in EN 12834/ISO 15628 6.2.2 and 6.2.3 below account for the EFC application-
specific information that shall be included in the BST and VST, respectively.
NOTE The OBE evaluates the received BST, and selects the applications that it wishes to perform out of the lists of
applications supported by the RSE. If the OBE does not support any of application(s) supported by the RSE, then it is
recommended that the OBE does not exchange any information with the RSE. If the OBE supports at least one of the
application(s) supported by the RSE, then it is recommended that the OBE informs the RSE of which application it wishes
to execute in its corresponding VST.
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
12
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
RSE OBE
EFC- EFC-
application Layer 7 Layer 7 application
I-Kernel T-Kernel I-Kernel T-Kernel
RegisterApplication
Beacon [Link](BST) RegAppVehicle
T-APDU([Link](BST))
BST
[Link](BST)
NotifyApplication
Vehicle
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
T-APDU([Link](VST))
[Link](VST) VST
NotifyApplication
Beacon
The Initialisation service associated with the initialisation phase is only used by the Initialisation Kernel
(of EN 12834/ISO 15628), which in its turn is configured by the application(s) wishing to execute applications
over a DSRC link. The Initialisation Kernels of the RSE and of the concerned OBE shall have been configured,
according to EN 12834/ISO 15628, prior to the invocation of the Initialisation service by the RSE.
An RSE supporting EFC shall have configured its Initialisation Kernel to carry the following information related
specifically to the EFC application(s):
the application identifier (AID) shall be equal to 1 (i.e. the value assigned for EFC);
EID shall not be transmitted in the BST related to the EFC application;
NOTE 1 AID equals to 14 identifies the multi-purpose payment context. In Japan, ISO 14906 specifies the application
interface for DSRC used for multi-purpose payment (when the Aid=14 is used in Japan, the EID and parameter fields are
defined through the BST).
There shall be only one EFC application present in the BST (i.e. there shall be only one instance of AID=1 in
the BST) regardless of whether the RSE supports more than one EFC-ContextMark (see also 6.2.3).
NOTE 2 The above is the EFC application-specific contents of the BST. The complete BST is defined in
EN 12834/ISO 15628 and is given below for readability of this International Standard:
Each EFC application and corresponding contract shall be associated with an EFC-ContextMark, as defined
below. An OBE may support several EFC applications.
NOTE 1 It is outside the scope of this International Standard to define in which order EFC-ContextMarks shall be
presented in order to indicate a user's order of preference, in case his OBE supports several EFC applications. Such rules
for indicating the user's order of preference may be subject to agreements between operators.
An OBE supporting EFC shall have configured its Initialisation Kernel to carry the following information related
specifically to the concerned EFC application:
the EID value shall be logically associated with the corresponding EFC-ContextMark, contained in the
Parameter, and shall be unique within the OBE throughout the complete DSRC session;
the Parameter shall be of Container CHOICE type OCTET STRING and shall comprise the EFC-
ContextMark as defined below, and may also be configured to carry additional EFC attributes (as defined
in Clause 8 and Annex A).
EFC-ContextMark::=SEQUENCE{
ContractProvider Provider,
TypeOfContract OCTET STRING (SIZE(2)),
ContextVersion INTEGER(0..127,..)
}
The EFC-ContextMark denotes a specific EFC context in the OBE, comprising the organization that issued
the contract, the type of contract and the context version. ContractProvider, TypeOfContract and
ContextVersion are further defined in Clause 8 as data elements of the Attribute EFC-ContextMark.
NOTE 2 The above is the EFC application-specific contents of the VST. The complete VST is defined in
EN 12834/ISO 15628 and is given below for readability of this International Standard:
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
14
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
where:
NOTE 4 Aid equals to 14 identifies the Multi-purpose payment context. In Japan, ISO 14906 specifies the application
interface for DSRC used for multi-purpose payment (when the Aid=14 is used in Japan, the EID and parameter fields are
defined through the BST).
NOTE 5 An EFC application provider retains the ultimate control of his security domain, i.e. the security level and the
associated security mechanisms to be used within his system.
The data element obeStatus contained in the data element obeConfiguration shall always be present and may
indicate the status of the OBE's battery. This information may be used by the RSE to notify the driver (e.g.
using the SET_MMI code “contact operator”). See Annex A for details.
NOTE 6 Retrofit DSRC OBE are mostly battery powered, and the battery usually has a lifetime which is dependent on
the actual usage of the OBE (number of transactions per day, activation of MMI, etc.). In an interoperable environment, the
Toll Charger(s) can access to the OBE via the DSRC interface and can can check the status of the battery and indicate it
to the driver.
After completion of the Initialisation phase, the appropriate RSE application is informed (by means of the
Notify Application RSU service) of the EFC-ContextMark and associated EID. The RSE shall use the functions
defined in Clause 7 to complete the EFC transaction.
The RSE may invoke any sequence of EFC functions to complete the EFC transaction, provided that they are
supported by the EFC-ContextMark. The OBE shall respond to the EFC functions invoked by the RSE, and
shall not initiate any EFC functions (by usage of a request service primitive, see further Clause 7) on its side.
Due to the construction of the EFC part of the VST, each EID identifies a certain EFC-ContextMark and shall
be used by the RSE as parameter of every function to unambiguously address data elements within the
context given by the EFC-ContextMark. More than one EID may be used in one session.
Both which attributes that are to be implemented and the maximum number of instances of an attribute is
defined at time of configuration of the OBE, and is outside the scope of this International Standard. These
implementation dependent aspects are referenced unambiguously by the EFC-ContextMark (for each element
present in the OBE).
EID = 1
EID = 2
EID = 3
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
NOTE 1 This construction of contexts being identified by EIDs allows amongst others to implement the following
transactions:
Booking from two contracts in one transaction. There is sometimes the need to book from two contracts in one
session, e.g. when a customer has a contract with a reduced price (e.g. a commuter contract) for part of the route
being tolled, plus an ordinary (not reduced) contract for the rest of the route. This may be implemented by having all
data groups identical between two EIDs, except for the data group contract.
Having either two instances of the data group Vehicle to accommodate a pulling vehicle plus a trailer, or having two
Elements containing same attribute one for the pulling vehicle and one for the trailer (and probably also separate
Contract)
NOTE 2 This EFC transaction model and associated procedures allow for different levels of co-existence and
interoperability between operators:
No agreement between operators - each operator has a completely separate application domain, i.e. there are no
common data groups. Each operator uses the attributes associated with “his” EFC-Context Mark.
Agreement to share some data groups, but not others. E.g. the data groups Vehicle, Receipt and Payment are
shared, but not Contract. Different security measures (algorithms) are used by the two operators (or more. Or, all
data groups are shared, except for Payment - each operator books from an account issued by himself.
Agreement between operators (Toll Chargers and ETS Provider): each Toll Charger has the possibility to select only
the attributes needed for a given toll context (principle of “Pick what you need”) amongst common Data Group.
Copyright International Organization for Standardization 16 © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
7 EFC Functions
This clause describes the EFC functions invoked by T-ASDUs exchanged between peer applications
communicating via a DSRC link. The T-ASDUs are exchanged by means of service primitives of the DSRC
Application Layer (EN 12834/ISO 15628). Exchanges of service primitives (and the corresponding T-ASDUs)
associated with EFC functions adhere to the following basic pattern:
[Link] (request) service primitive invoked by the RSE application to DSRC Application Layer;
[Link] (indication) service primitive issued by the DSRC Application Layer to the OBE application;
[Link] (response) service primitive invoked by the OBE application to DSRC Application Layer;
[Link] (confirmation) service primitive issued by the DSRC Application Layer to RSE application.
The last two steps are either mandatory or optional, depending on the nature of the service primitive and on
the setting of the Mode parameter (see 6.2.4 in EN 12834/ISO 15628).
The logical sequence of a successful service primitives exchange (for Mode = TRUE) is illustrated in Figure 8
below. Service primitives that occur earlier in time, and are connected by dotted lines in the figure, are the
logical antecedents of subsequent service primitives.
RSE OBE
AP DSRC application layer DSRC application layer AP
[Link]
[Link]
[Link]
[Link]
For the purposes of this International Standard, the DSRC link is seen as completely transparent, i.e. in the
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
absence of exceptions the [Link] is identical in content and meaning to the [Link], and the [Link] is
identical in content and meaning to the [Link]. For the purpose of conciseness there will be:
one description for request, i.e. [Link], covering both request and indication service primitives;
one description for response, i.e. [Link], covering both response and confirmation service primitives.
The format and the parameters of the service primitives of the DSRC application layer are defined in
EN 12834/ISO 15628, 6.2.2 (T Kernel Services).
This subclause provides an overview of the EFC functions as shown in Table 1 (based on the ACTION service
primitive of EN 12834/ISO 15628) that are defined in 7.2 of this International Standard. Each EFC function
comprises a pair of service primitives, a request and its associated response service primitive, which are
accounted for in 7.2.
GET_SECURE 2 OCTET STRING OCTET STRING gets data securely from the OBE
SET_SECURE 3 OCTET STRING OCTET STRING sets data securely in the OBE
The GET and SET services (DSRC application layer functions) as defined in EN 12834/ISO 15628 (in 6.2)
may also be used in an EFC transaction phase.
NOTE GET is used to retrieve (i.e. read) value(s) of the addressed attribute(s), a reply is always expected. SET is
used to set (i.e. write) value(s) of the addressed attribute(s).
For the purpose of description, the number of instances is denoted by n. In general the EFC functions
operating on multiple instances of OBE Attributes can be divided into the following groups:
GET, GET_STAMPED : These functions shall always access the last instance (i.e. instance at position 0).
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,
If no instance is available, the result is undefined but may lead to the return of an error code.
18
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
GET_INSTANCE : This function carries parameters N1 and N2, both t 0. It shall return the following:
if N2 >= N1 then the values of the instances numbered N1, N1+1, ... up to and including min(N2, n).
NOTE 1 The case that zero instances are returned is legal, in this case the response carries an empty list.
SET, SET_STAMPED : These functions shall always set the value of instance at position 0. In addition,
the previous instance number p (where p is an integer between 0 and Nmax-1) shall become instance
number p+1, and instance number Nmax shall no longer be available.
NOTE 3 The description above also covers the common case for Nmax =1. In this case it leads to overwriting the old
value of the single instance.
SET_INSTANCE : This function carries a parameter N t0, and a value for the addressed attribute. It shall
always set the value of instance number N.
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
Assume Nmax = 3. Let n = 0 initially. Table 3 shows the effects of a certain sequence of functions.
7.1.4 Security
[Link] General
Whilst security is an essential part of EFC applications, the actual mechanisms are outside the scope of this
International Standard. It is generally recognised that security mechanisms involve many parameters, like
encryption algorithm and keys (if the security mechanism is encryption based at all), hash function, key length,
padding method, redundancy data etc. It is assumed that the EFC application communicating parties know
everything they need, either by implementation or by deriving information from the VST. This information
should suffice for the RSE to determine how to proceed. The OBE, in general, supports only a limited number
of security mechanisms.
In this International Standard, only a framework is defined permitting security mechanisms to be specified
unambiguously at the discretion of the application provider. It includes the Access Credentials defined in
EN 12834/ISO 15628. In addition security values, like authenticators, will often be needed for additional
protection.
Access Credentials and Authenticators are defined as being of ASN.1 type OCTET STRING. This only
pertains to the ASN.1 syntax; the semantics are implicit in the context given by the EFC-Context Mark as
specified in the VST, and as selected by the EID.
Access Credentials shall be used to manage access to attributes. Different access conditions can apply for
different attributes, and if so different access credentials should be associated with these access conditions.
EXAMPLE The VehicleDimensions EFC attribute may be associated with no access conditions whilst the
ContractSerialNumber and ContractValidity EFC attributes may be subject to access conditions (e.g. requiring the correct
password to be presented).
Authenticators shall primarily pertain to values, and prove the source and/or the integrity of the data unit and
protect against forgery. Authenticators are used in cryptography related EFC functions such as
GET_STAMPED and SET_STAMPED. Authenticators can be transmitted from the RSE to the OBE, as
Access Credentials in order to prove the authenticity of the RSE, or from the OBE to the RSE to prove the
source and/or integrity of the data unit.
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
20
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
The security mechanisms to be applied, and the exact role of Access Credentials and Authenticators, will be
determined by the owner of the EFC-ContextMark and is outside the scope of this International Standard.
NOTE ISO/TS 17574 provides guidelines for preparation and evaluation of appropriate security measures.
7.2.1 General
In this section, the EFC functions are specified in detail. The format and the parameters of the EFC functions
shall adhere to the Action service primitives of the DSRC application layer as defined in 6.2.2 (Transfer Kernel
Services) in EN 12834/ISO 15628. Not all parameters associated with the EFC functions are accounted for in
this clause, as they are either not specifically needed for the EFC applications or have the same meaning for
all functions.
The Return Codes (RET) are explicitly specified whenever additional precision is needed on top of the
specifications given in 6.2.4 of EN 12834/ISO 15628.
The ASN.1 type specifications of the ActionParameters and ResponseParameters are provided in the
normative Annex A.
7.2.2 GET_STAMPED
GET_STAMPED is used to retrieve the value(s) of the addressed attribute(s), with an authenticator appended
to the retrieved data. The authenticator generation involves transformations (notably encryption) that may
include a nonce value (e.g. a random number or a sequence number).
Table 4 — GET_STAMPED.request
Parameter name ASN.1 type Value Remark/Constraints
ActionType INTEGER(0..127,...) 0
GET_STAMPED.request shall request the retrieval of the value(s) of the attributes addressed by the
attributeIdList, with an authenticator given in the response. A response shall always be expected
(Mode = TRUE). The parameter keyRef shall contain a reference to the key to be used for the calculation of
the authenticator in the response. See Table 4.
NOTE 1 The AccessCredentials are only needed if the data attributes addressed by EID and attributeIdList require
authentication of the RSE.
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
Table 5 — GET_STAMPED.response
Parameter name ASN.1 type Value Remark/Constrai
nts
GET_STAMPED.response shall carry the retrieved value(s) of the addressed attribute(s) in the attributeList,
as the result of the corresponding GET_STAMPED.request command. An authenticator over the retrieved
values shall be carried in the authenticator parameter, with the keyRef parameter of the
GET_STAMPED.request being used as a reference to the (cryptographic) key to be used. When a nonce of
non-zero length is given in the request, the nonce value shall be included in the cryptographic transformation.
See Table 5.
NOTE 2 GET_STAMPED can be used with an empty attributeIdList to request an authenticator from the OBE to
authenticate the OBE EFC application.
7.2.3 SET_STAMPED
SET_STAMPED is used to set the value(s) of the addressed attribute(s), with the OBE returning an
authenticator as a proof that the data has been set. The authenticator generation involves transformations
(notably encryption) which may include a nonce value (e.g. a random number or a sequence number).
Table 6 — SET_STAMPED.request
Parameter name ASN.1 type Value Remark/Constraints
ActionType INTEGER(0..127,...) 1
SET_STAMPED.request shall request the setting of the value(s) of the attributes addressed by the
attributeList, with an authenticator given in the response. A response shall always be expected (Mode =
TRUE). See Table 6.
Table 7 — SET_STAMPED.response
parameter name ASN.1 type Value Remark/Constraints
SET_STAMPED.response shall carry an authenticator as the response parameter (being of ASN.1 type
OCTET STRING) to the corresponding request to convey that the data in the attribute list of the request have
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
22
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
been set. The authenticator shall be calculated over the values given in the request attributeList, with the
keyRef parameter of the request being used as a reference to the (cryptographic) key to be used. When a
nonce of non-zero length is given in the request, the nonce value shall be included in the cryptographic
transformation. See Table 7.
7.2.4 GET_SECURE
GET_SECURE is used to retrieve the value(s) of attribute(s) subject to security measures defined implicitly by
the context identification set in the initialisation phase. These measures may involve any kind of
transformations (notably encryption).
Table 8 — GET_SECURE.request
parameter name ASN.1 type Value Remark/Constraints
ActionType INTEGER(0..127,...) 2
GET_SECURE.request shall request the retrieval of attributes subject to security measures implicit in the
context set in the VST, amongst others by explicit reference given in the action parameter. The
ActionParameter (being of ASN.1 type OCTET STRING) shall carry the AttributeIds of the requested attributes
plus any information (nonce, key reference) required by the algorithm providing the security measures. A reply
is always expected (Mode = TRUE). See Table 8.
NOTE 1 The accessCredentials are only needed if the data attributes addressed by EID and AttributeIdList require
them.
NOTE 2 The interpretation of the actionParameter is defined by the security mechanism in effect, which is implicit in
the context identification in the initialisation phase. The parameter includes a AttrIDList (possibly encrypted), and it may
e.g. also contain an authenticator for non-repudiation purposes.
Table 9 — GET_SECURE.response
parameter name ASN.1 type Value Remark/Constraints
GET_SECURE.response shall carry as the responseParameter (being of ASN.1 type OCTET STRING) to the
corresponding request the requested value(s) of the addressed attribute(s) in the form (e.g. encrypted)
implicitly defined in the context set in the VST, amongst others by explicit reference given in the action
parameter. See Table 9.
NOTE 3 The interpretation of the responseParameter is defined by the security mechanism that is in effect. The
parameter includes a (possibly encrypted, or otherwise transformed) AttributeList. It may in addition contain, e.g., an
authenticator for non-repudiation purposes.
--`,```,``,,```,``,`,```
7.2.5 SET_SECURE
SET_SECURE is used to set the value(s) of attribute(s) subject to security measures defined implicitly by the
context identification set in the initialisation phase. These measures may involve any kind of transformations
and additions (e.g. checking of authenticators).
Table 10 — SET_SECURE.request
parameter name ASN.1 type Value Remark/Constraints
ActionType INTEGER(0..127,...) 3
Mode BOOLEAN
SET_SECURE.request shall request the setting of attributes subject to security measures implicit in the
context set in the VST, amongst others by explicit reference given in the action parameter. The
ActionParameter (being of ASN.1 type OCTET STRING) shall carry the attributes to be set plus any
information (authenticator, nonce, key reference) required by the algorithm providing the security measures.
SET_SECURE.request can be used in confirmed or non-confirmed mode; a reply shall always be expected in
the former case. See Table 10.
NOTE 1 The interpretation of the ActionParameter is defined by the security mechanism in effect, which is implicit in
the context identification in the initialisation phase. The parameter includes a attrList (possibly encrypted), and it may e.g.
also contain an authenticator for non-repudiation purposes.
Table 11 — SET_SECURE.response
Parameter name ASN.1 type Value Remark/Constraints
SET_SECURE.response shall, if used in the confirmed mode, carry as the ResponseParameter (being of
ASN.1 type OCTET STRING) the confirmation of the corresponding request. The confirmation shall be in the
form implicitly defined in the context set in the VST, amongst others by explicit reference given in the action
parameter. See Table 11.
NOTE 2 The interpretation of the ResponseParameter is entirely defined by the security mechanism that is in effect,
which is implicit in the context identification in the initialisation phase. It may, e.g., be empty or contain an authenticator to
be used for non-repudiation of receipt.
7.2.6 GET_INSTANCE
GET _INSTANCE is used to retrieve a number of values from multiple instances of the addressed attributes
(see 7.1.3 for the handling of multiple instances).
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
24
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
Table 12 — GET_INSTANCE.request
parameter name ASN.1 type Value Remark/Constraint
s
ActionType INTEGER(0..127,...) 4
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
posOfLastInstance INTEGER(0..255),
attributeIdList AttributeIdList}
GET_INSTANCE.request shall request the retrieval of a number of instances of the value(s) of the addressed
attribute(s). The ActionParameter contains the position of the first instance and the last instance of the
instances of the specified attribute(s) to be retrieved. GET_INSTANCE.request can only be used in confirmed
mode; a reply shall always be expected. See Table 12.
Table 13 — GET_INSTANCE.response
parameter name ASN.1 type Value Remark/Constraints
GET_INSTANCE.response shall, as response to the corresponding request, contain all available values of the
requested attributes, starting from the value at the first position (posOfFirstInstance) up to the value at the last
position (posOfLastInstance), as asked for in the request. The ResponseParameter shall for each requested
attribute in turn contain first the attribute Id of the requested attribute, followed by the values of the attribute.
The value(s) of an attribute at the first position shall be transferred first in the parameter attributeValues. See
Table 13.
7.2.7 SET_INSTANCE
SET _INSTANCE is used to set the value of a specified entry from multiple instances of the addressed
attribute (see 7.1.3 for the handling of multiple instances).
Table 14 — SET_INSTANCE.request
Parameter name ASN.1 type Value Remark/Constraints
ActionType INTEGER(0..127,...) 5
SET_INSTANCE.request shall request the replacement of a selected instance of the addressed attribute. The
ActionParameter contains the value (posOfInstance) attempted to be replaced and the attribute Id.
SET_INSTANCE.request can be used in confirmed or non-confirmed mode (i.e. Mode equal to TRUE or
FALSE, respectively); a reply shall always be expected in the former case. See Table 14.
Table 15 — SET_INSTANCE.response
Parameter name ASN.1 type Value Remark/Constraints
ResponseParameter None
Return Code (Ret) ReturnStatus optional use
7.2.8 GET_NONCE
GET_NONCE is used by the RSE to obtain a nonce value (e.g. a random number, a sequencing number or a
time stamp) to be used for guaranteeing a unique relationship between a number of related data items. The
retrieved value shall remain “active” throughout the session or until a new GET_NONCE service has been
successfully completed within the same session.
EXAMPLE GET_NONCE can be used to get a challenge value, which is used as an input parameter when computing the
applicable access credentials (e.g. an authenticator). The resulting data can subsequently be included as access
credentials in another request command.
Guaranteeing uniqueness implies certain requirements on the value to be produced, e.g. sequencing numbers
and random numbers should have a sufficiently large period, time stamps should have sufficiently high
resolution. In addition, random numbers may have to be generated by a cryptographic algorithm to be
“unpredictable” enough. These additional requirements are outside the scope of this International Standard.
Table 16 — GET_NONCE.request
Parameter name ASN.1 type Value Remark/Constraints
ActionType INTEGER(0..127,...) 6
GET_NONCE.request shall request the retrieval of a value to be used for guaranteeing a unique relationship
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
between a number of related data items. GET_NONCE.request shall always be used in confirmed mode; a
reply shall always be expected. See Table 16.
26
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
Table 17 — GET_NONCE.response
Parameter name ASN.1 type Value Remark/Constraints
When the GET_NONCE.request is not supported by the OBE EFC application, then the Return Code shall
indicate complexityLimitation, and ResponseParameter shall be empty.
7.2.9 SET_NONCE
SET_NONCE is used by the RSE to present a value (e.g. a sequencing number, a random number or a time
stamp) to the OBE, to be used for guaranteeing a unique relationship between a number of related data items.
The set value remains ”active” throughout the session or until a new SET_NONCE service has been
successfully completed within the same session.
Table 18 — SET_NONCE.request
parameter name ASN.1 type Value Remark/Constraints
ActionType INTEGER(0..127,...) 7
Mode BOOLEAN
SET_NONCE.request shall request setting a nonce value to be used for guaranteeing a unique relationship
between a number of related data items. The ActionParameter (being of ASN.1 type OCTET STRING) shall
carry the nonce value. SET_NONCE.request can be used in confirmed or non-confirmed mode (i.e. Mode
equal to TRUE or FALSE, respectively); a reply shall always be expected in the former case. See Table 18.
Table 19 — SET_NONCE.response
parameter name ASN.1 type Value Remark/Constraints
SET_NONCE.response shall be issued as a response to the corresponding request to convey the result of the
request. A receiving peer entity supporting no nonce shall return a Return Code indicating Complexity
Limitation. See Table 19.
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
7.2.10 TRANSFER_CHANNEL
TRANSFER_CHANNEL is used to send and/or retrieve data from a dedicated channel of the OBE.
Table 20 — TRANSFER_CHANNEL.request
parameter name ASN.1 type Value Remark/Constraints
ActionType INTEGER(0..127,...) 8
Mode BOOLEAN
TRANSFER_CHANNEL.request shall request data transfer from and/or to a dedicated channel of the OBE.
The channel shall be addressed by the parameter channelled. Data to be transferred to the OBE channel shall
be contained in the parameter apdu in a format recognised by the addressed component. In case no data is to
be set to the OBE channel, the apdu can be empty. The direction(s) of transfer is either implicitly given by the
context of the addressed channel within the context given in the VST, or is to be conveyed as part of the
parameter apdu in a format appropriate for the addressed channel. See Table 20.
NOTE TRANSFER_CHANNEL allows addressing of data residing in components of the OBE using a transparent
application layer protocol bridge. The command can e.g. be used to address a serial interface, or an electronic purse that
requires a protocol that is not covered by the DEBIT command.
Table 21 — TRANSFER_CHANNEL.response
parameter name ASN.1 type Value Remark/Constraints
TRANSFER_CHANNEL.response shall carry the response to the requested data transfer from and/or to a
dedicated channel of the OBE. The parameter channelled shall contain the channel Id of the request. Data
requested to be transferred from the OBE channel shall be contained in the parameter apdu in a format
specific to the addressed component. In case no data is to be returned from the OBE channel, the apdu can
be empty. See Table 21.
7.2.11 COPY
Copy is used to copy the values of the addressed attribute(s) to another EID (i.e. the destination Id).
EXAMPLE 1 When not implemented in the OBE itself, “sharing” of data attributes for common use between two
operators (between two different context addressed by two different EIDs) can be performed with a copy command. Note
that operators can protect the data under “their” EID by requiring certain Access Credentials only known to parties they
have an agreement with.
EXAMPLE 2 The RSE sets (i.e. writes) the last event into the Receipt data group in the OBE, which only stores a limited
number of events. The RSE invokes a copy command requesting the OBE to copy the value of the last event to the event
log of the ICC.
Copyright International Organization for Standardization 28 © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
Table 22 — [Link]
parameter name ASN.1 type Value Remark/Constraints
ActionType INTEGER(0..127,...) 9
Mode BOOLEAN
[Link] shall request the copying of the value(s) of the addressed attribute(s) to the same attribute(s)
in a destination EID. [Link] can be used in confirmed or unconfirmed mode; a reply shall always be
expected in the former case. See Table 22.
Table 23 — [Link]
parameter name ASN.1 type Value Remark/Constraints
[Link] shall be used to explicitly convey the result of the corresponding [Link] command.
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
7.2.12 SET_MMI
Table 24 — SET_MMI.request
parameter name ASN.1 type Value Remark/Constraints
ActionType INTEGER(0..127,...) 10
noSignalling (255)
} (0..255)
Mode BOOLEAN
SET_MMI.request shall request to control the MMI in a device-independent way. The ActionParameter shall
contain the MMI function that is to be invoked, e.g. signalling of a successful operation (such as a successful
EFC transaction), a non-successful operation or signalling to contact the operator (e.g. due to low balance).
SET_MMI.request can be used in confirmed or non-confirmed mode; a reply shall always be expected in the
former case. See Table 24.
Table 25 — SET_MMI.response
parameter name ASN.1 type Value Remark/Constraints
SET_MMI.response shall be used to explicitly convey the result of the corresponding SET_MMI.request
command. If Mode was set to TRUE in the corresponding request and the operation was successfully
executed then the response shall indicate no error. If an error occurred at an attempt to execute the command
then the Return Code shall take the appropriate value. See Table 25.
To retain compatibility with existing OBE, future OBE may accept SET_MMI with any value of the EID, and
with Container type =0(dec). and 69(dec).
7.2.13 SUBTRACT
SUBTRACT is used to subtract a given INTEGER value from another value of an INTEGER-type attribute.
Table 26 — [Link]
parameter name ASN.1 type Value Remark/Constraints
ActionType INTEGER(0..127,...) 11
Mode BOOLEAN
[Link] is used to request the subtraction of the value, as contained in the action parameter, from
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
the value of the addressed attribute. [Link] can be used in confirmed or non-confirmed mode; a
reply shall always be expected in the former case. See Table 26.
Table 27 — [Link]
parameter name ASN.1 type Value Remark/Constraints
ResponseParameter n.a.
30
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
7.2.14 ADD
ADD is used to add a given INTEGER value to another value of an INTEGER-type attribute.
Table 28 — [Link]
parameter name ASN.1 type Value Remark/Constraints
ActionType INTEGER(0..127,...) 12
Mode BOOLEAN
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
[Link] shall request the addition of the value, as contained in the action parameter, to the value of the
addressed attribute. [Link] can be used in confirmed or non-confirmed mode; a reply shall always be
expected in the former case. See Table 28.
Table 29 — [Link]
parameter name ASN.1 type Value Remark/Constraints
ResponseParameter n.a.
[Link] is a response used to explicitly convey the result of the corresponding [Link] command.
[Link] shall be invoked upon completion of an attempt to execute the corresponding [Link]
command. See Table 29.
7.2.15 DEBIT
DEBIT is used to perform a debit on the attribute PaymentMeansBalance. The command contains payment
related data (a price) and optionally security related data. A (cryptographic) proof of payment can be returned.
Table 30 — [Link]
parameter name ASN.1 type Value Remark/Constraints
ActionType INTEGER(0..127,...) 13
Table 31 — [Link]
parameter name ASN.1 type Value Remark/Constraints
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
debitAuthenticator OCTET STRING }
Return Code (Ret) ReturnStatus optional use
[Link] shall contain the response to the corresponding request. On reception of a DEBIT command,
in case the currencies of the debitPaymentFee parameter of the request and of the attribute
PaymentMeansUnit in the OBE match, the OBE shall attempt to subtract the requested debitPaymentFee
from the attribute PaymentMeansBalance, taking the multiplicators of the debitPaymentFee parameter and of
the attribute PaymentMeansUnit into account. In case of currency mismatch, the OBE shall not subtract the
amount given in debitPaymentFee, and shall return debitResult = 'Transaction not successful, currency not
accepted'. See Table 31.
Depending on the context identified by the VST or implicitly given by the type of payment means, the
response shall either include a proof of payment in debitAuthenticator, or return an empty debitAuthenticator.
When a nonce of non-zero length is given in the request, the nonce value shall be included in the
cryptographic transformation performed to generate debitAuthenticator. If a nonce of zero length is given and
if a nonce is required by the cryptographic algorithm, then the nonce given in the most recent SET_NONCE
command of the session shall be used.
In case the attempt to debit failed, the parameter debitResult shall be set to the appropriate value.
7.2.16 CREDIT
CREDIT is used to perform a credit (refund) on the attribute PaymentMeansBalance. The command contains
payment related data (a refund) and optionally security related data. A (cryptographic) proof can be returned.
Table 32 — [Link]
ActionType INTEGER(0..127,...) 14
32
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
The parameter refund shall contain the price, including a currency and a multiplicator, to be added to the
attribute PaymentMeansBalance, where PaymentMeansUnit, the unit of PaymentMeansBalance, shall be
taken into account. Nonce shall contain a nonce value to be included in the (cryptographic) calculation of the
response authenticator or be empty. The parameter keyRef shall contain a reference to the key to be used for
the calculation of the authenticator in the response, if required. See Table 32.
Table 33 — [Link]
parameter name ASN.1 type Value Remark/Constraints
[Link] shall contain the response to the corresponding request. On reception of a CREDIT
command, in case the currencies of the refund parameter of the request and of the attribute
PaymentMeansUnit in the OBE match, the OBE shall attempt to add the requested refund to the attribute
PaymentMeansBalance, taking the multiplicators of the debitPaymentFee parameter and of the attribute
PaymentMeansUnit into account. In case of currency mismatch, the OBE shall not add the amount given in
debitPaymentFee, and shall return creditResult = 'Transaction not successful, currency not accepted'. See
Table 33.
Depending on the context identified by the VST or implicitly given by the type of payment means, the
response shall either include a proof of refund in creditAuthenticator, or return an empty creditAuthenticator.
When a nonce of non-zero length is given in the request, the nonce value shall be included in the
cryptographic transformation performed to generate creditAuthenticator. If a nonce of zero length is given and
if a nonce is required by the cryptographic algorithm, then the nonce given in the most recent SET_NONCE
command of the session shall be used.
In case the attempt to credit failed, the parameter creditResult shall be set to the appropriate value.
7.2.17 ECHO
ECHO is used for dummy data (i.e. bitstream) being sent to, and returned by, the peer service user. This
service may be used for testing purposes and for localisation of the OBE during the passage of the
DSRC-EFC station.
Table 34 — [Link]
parameter name ASN.1 type Value Remark/Constraints
ActionType INTEGER(0..127,...) 15
Mode BOOLEAN
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
[Link] shall request dummy data (i.e. an octet string of variable length) to be sent to and returned by
the addressed OBE. [Link] can be used in confirmed or non-confirmed mode; a reply shall always be
expected in the former case. See Table 34.
Table 35 — [Link]
parameter name ASN.1 type Value Remark/Constraints
[Link] shall be used to return the data conveyed in ActionParameter, or the result, of the
corresponding [Link] command. See Table 35.
8 EFC Attributes
8.1 General
Within the context of EFC, the following EFC Attributes in Table 36, or a subset thereof, shall be available to
perform an EFC transaction.
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
34
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
In an OBE. any attribute or data element which is present but not explicitly defined shall be filled with '0's
(binary). Care should be taken to ensure backward compatibility when an 'old' OBE is read by a 'new' RSE'.
NOTE 1 ReceiptData1, ReceiptData2 and ValidityOfContract have been added since the previous edition of this
International Standard (i.e. ISO 14906). The assignment of attribute identifier numbers of this International Standard is
backwards compatible with the previous edition.
NOTE 2 The definition of PaymentMeans and ReceiptFinancialPart has changed in the transformation from the pre-
standard edition to this edition of the document. The corresponding attribute identifier numbers have changed in order to
ensure cohabitation with the previous edition. The attribute id numbers 28 and 8 were assigned to PaymentMeans and
ReceiptFinancialPart, respectively, in ISO 14906.
Not every EFC attribute has to be present in any one implementation of this International Standard in order to
be compliant except for the EFC ContextMark (in VST). A transaction can be made with a combination of
Public and Private Attributes.
NOTE 3 Which EFC attributes are present and which are not is implementation dependent. The implementation is
identified by the context given in the EFC-ContextMark of the VST.
In the following tables, EFC Attributes are grouped into data group tables and specified in terms of:
the names of the data elements forming the EFC Attribute - there are no optional data elements within
any one EFC attribute;
EFC Attributes that describe similar aspects of EFC information are grouped into data groups. The grouping
has been made to facilitate readability and imply neither any relations with regard to addressing nor to logical
interdependence. The specification of the corresponding ASN.1 module is provided in the normative Annex A.
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
8.2 Data group CONTRACT
Table 37 presents information associated with the service rights of the user of a Toll service.
Table 38 presents information associated to a specific session, including both financial and operational data.
Table 39 presents information pertaining to the vehicle (i.e. the pulling vehicle) and to the attached the
trailer(s). When more sets of vehicle characteristics are needed within the context of an EID, e.g. to cater for
several pulling vehicles with different characteristics associated to the OBE or the presence of more than one
trailer, then multiple instances of the pertinent EFC attributes shall be used.
36
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
Data pertaining to one specific vehicle or trailer and carried in separate attributes shall be contained in the
same instance number of those attributes (e.g. data for trailer 1 in Instance 0 of TrailerLicencePLateNumber
and TrailerCharacteristics and data for trailer 2 in instance 1 of the same attributes).
Table 41 presents driver/user-related information (groups/individuals) used to calculate the tariff to be applied.
The tariff may depend on the characteristics of the driver, as for example a specific group of drivers (category)
or driving behaviour.
The following requirements have been taken into account for the definition of the payment attribute. Various
payment types should be supported:
on-board account;
central account;
purse/token-based payment;
no/zero payment;
refunding.
The EFC transaction can be divided into an EFC service transaction and an EFC payment transaction (for
example the visit in a restaurant also involves a service transaction (ordering and serving of meals) and a
payment transaction (cash, credit card)). The contract provides the link between service transaction and
payment transaction.
The EFC service provider may be independent of the payment system operator/issuer. There may be also
different security domains. In order to accommodate open payment systems, the payment attribute may be
transmitted transparently (as OCTET STRING) from the OBE to the RSE. The Balance and the currency may
be accessed independently, in order not to disclose the balance when only currency is needed to debit the
right price.
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
EFC Attribute Data element Definition Type Length in Value range Informative remarks
for Standardization
octet
ValidityOf Issuer Restrictions ContractProvider issuer specific coding OCTET 2 Allows for finer validity restrictions in
reserved
and is to be kept short.)
ContractExpiry End date of the validity of the contract. DateCompact 2 [01.01.1990].. Start date not given - it is usually
Date Contract validity ends at 24 h of [31.12.2117] implicitly given by the type of contract.
ContractExpiryDate. When necessary it may be calculated,
since duration of validity may be coded
in ContractValidity or follows implicitly
from TypeOfContract.
ContractVehicle ContractVehicle For vehicle bound contracts, LPN variable Contracts valid for two or three vehicles
ContractVehicle gives the licence plate may be handled with multiple instances
number to which the contract is of ContractVehicle.
restricted.
Contract Contract Authenticator calculated by the OCTET STRING variable It is not specified over which attributes
Authenticator Authenticator ContractProvider when issuing the of the data group the authenticator is to
Contract, to prevent tampering with be calculated.
contract data.
39
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
--`,```,``,,```,``,`,```,``,``,,-`
40
Table 38 — Data group Receipt
EFC Attribute Data element Definition Type Length in Value range Informative remarks
[Link],
EFC Attribute Data element Definition Type Length in Value range Informative remarks
© Standardization
octet
Receipt PersonalAccount Coded according to financial PersonalAccount 10 Personal account number shall be in
reserved
SessionCurrent Balance of the payment means after PurseBalance 5 In case SessionCurrentBalance is not
Balance the session. applicable, the value 0 shall be used.
ReceiptFinancial Serial number of the financial receipt INT4 4 0 ..
SerialNumber 4294967295
ReceiptContract SessionContract Organization that issued the contract Provider 3 AA..ZZ & Type defined in Annex A.
Provider applied in the session. 0..16383
SessionTypeOf TypeOfContract applied in the session. OCTET 2
Contract STRING(SIZE(2))
SessionContract ContractSerialNumber of the contract INT4 4 0 ..
SerialNumber applied in the session. 4294967295
ReceiptOBUId ReceiptOBUId Serial number of the OBE used in the OCTET STRING Variable The manufacturer ID is always
session, unique within the context of exchanged as a part of the VST.
the manufacturer.
ReceiptICC-Id ReceiptICC-Id Identification number of smart card ICC-Id Variable Multiple instances for multiple ICCs.
used in the session.
ReceiptText ReceiptText Plain text decodeable by the OBE. OCTET STRING Variable May be used to display session
information to user (e.g. session
location).
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
Receipt Receipt Total distance covered by the vehicle, INT3 3 0..16777215 Vehicle distance readings, e.g. via an
Distance Distance since the beginning of its existence. interface to a tachograph, may be used
The distance unit shall be 100 metres. to the determine the PaymentFee
41
Table 38 (continued)
42
EFC Attribute Data element Definition Type Length in Value range Informative remarks
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
SessionResult Code designating whether a session ResultOp 1
has been completed successfully or
not.
SessionTariff Service provider specific tariff class INT1 1 Enables to reproduce the price
Class applied in the session. calculation (e.g. claimed or measured
vehicle class that was applied).
SessionClaimedCla Service provider specific vehicle class INT1 1 Claimed class and applied class (tariff
ss derived from claimed characteristics in class) may differ. The use of the
the data group Vehicle. attribute it is an operator decision.
SessionFee The amount paid for the service. PaymentFee 4 0..65535 & Contains a currency designation plus a
mulitplier & multiplicator.
currency code Currency code shall be according to
(12 bits) ISO 4217.
SessionContractPr Organization that provides the contract Provider 3 AA..ZZ & As ContractProvider defined in
for ISO
EFC Attribute Data element Definition Type Length in Value range Informative remarks
Standardization
octet
ReceiptData2 SessionTime Date and Time of session with a two- DateAndTime 4 [01.01.1990, Easy to decode into a displayable
reserved
SessionService Operator that provides the service of Provider 3 AA..ZZ & Identifier of an operator.
Provider the session. 0..16383
LocationOf Service provider specific coding of the INT2 2 0..65535 Toll plaza code defined by country
Station station location. organization.
SessionLocation Service provider specific coding of the SessionLocation 1 0/1 + 0..127 Travel direction + Lane Code.
session location within the station
location.
SessionType Designates the type of service station. INT1 1
SessionResult Code designating whether a session ResultOp 1
has been completed successfully or
not.
SessionTariff Service provider specific tariff class INT1 1 Enables to reproduce the price
Class applied in the session. calculation (e.g. claimed or measured
vehicle class that was applied).
SessionClaimedCl Service provider specific vehicle class INT1 1 Claimed class and applied class (tariff
ass derived from claimed characteristics in class) may differ. The use of the
the data group Vehicle. attribute it is an operator decision
SessionFee The amount paid for the service. PaymentFee 4 0..65535 & Contains a currency designation plus a
mulitplier & multiplicator.
43
ISO 14906:2011(E)
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
Table 39 — Data group Vehicle
44
EFC Attribute Data element Definition Type Length in Value range Informative remarks
for ISO
EFC Attribute Data element Definition Type Length in Value range Informative remarks
Standardization
octet
VehicleWeight VehicleMaxLaden Maximum permissible total INT2 2
reserved
VehicleTrain Maximum permissible weight of INT2 2 ISO 1176 Code ISO-M18 maximum design
MaximumWeight the complete vehicle train, which mass of vehicle combination
shall be as defined in ISO 1176.
10 kg units, rounded down to the
next 10kg step.
VehicleWeight Nominal unladen weight, which INT2 2
Unladen shall be according to ISO 1176
in 10 kg units, rounded down to
the next 10 kg step.
VehicleWeight VehicleWeightLaden Actual weight of vehicle including INT2 2
Laden load in 10 kg units, rounded
down to the next 10 kg step.
AxleWeight MaxLadenWeightOn Technically permissible INT2 2
Limits Axle1 maximum laden
weight on axle 1 of the vehicle,
10 kg units, rounded down to the
next 10 kg step.
MaxLadenWeightOn Technically permissible INT2 2
45
ISO 14906:2011(E)
Table 39 (continued)
46
EFC Attribute Data element Definition Type Length in Value range Informative remarks
for ISO
EFC Attribute Data element Definition Type Length in Value range Informative remarks
Standardization
octet
Exhaust EmissionCO Exhaust emission of CO, INTEGER If the emissions are measured directly on the
reserved
according to vehicle registration engine test bed the value is declared in g/kWh
documents, in 10-3 g/km or
g/kWh.
EmissionNOX Exhaust emission of NOX, INT 2 2 0...65535 If the emissions are measured directly on the
according to vehicle registration engine test bed the value is declared in g/kWh
documents, in 10-3 g/km or
g/kWh.
EmissionHCNOX Exhaust emission of HCNOX, INT 2 2 0...65535 If the emissions are measured directly on the
according to vehicle registration engine test bed the value is declared in g/kWh
documents, in 10-3 g/km or
g/kWh.
DieselEmission Particulate Particulates for diesel, according INTEGER(0…3276 2 If the emissions are measured directly on the
Values to vehicle registration 6) engine test bed the value is declared in g/kWh
documents, in 10-3 g/km or
g/kWh.
AbsorptionCoeff Corrected absorption coefficient INT 2 2 0...65535
for diesel, according to vehicle
registration documents,
47
ISO 14906:2011(E)
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
Table 39 (continued)
48
EFC Attribute Data element Definition Type Length in Value range Informative remarks
European Directive 2003/127/EC provides the requirements on data available in the registration document for vehicle. When available, the data from the registration
document should be used by the service provider for the encoding of the OBE.
NOTE Since the first version of this International Standard, the definition of this data element has been changed. This requires taking into account the potential backward compatibility
issues related to equipment and software compatible with the first generation of equipment.
for Standardization
octet
EquipmentOBUId EquipmentOBUId Unique Identification number of OBE OCTET STRING Variable The manufacturer ID is always
reserved
EquipmentStatus EquipmentStatus Operator-specific EFC application- BIT STRING 2 Boolean information to support an
related information pertaining to the (SIZE(16)) operator's handling of an OBE on
status of the equipment application level. (E.g. “next suitably
equipped gantry should take an
enforcement picture”).
49
50
Table 42 — Data group Payment
EFC Attribute Data element Definition Type Length in Value range Informative remarks
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
Annex A
(normative)
The EFC data types and associated coding related to the EFC action parameters, response parameters and
attributes, described in Clauses 7 and 8, are defined using the Abstract Syntax Notation One (ASN.1)
technique according to ISO/IEC 8824-1. The packed encoding rules according to ISO/IEC 8825-2 are applied.
maxLadenweightOnAxle1 Int2,
maxLadenweightOnAxle2 Int2,
maxLadenweightOnAxle3 Int2,
maxLadenweightOnAxle4 Int2,
maxLadenweightOnAxle5 Int2
}
AddRq::= SEQUENCE {
attributeId INTEGER(0..127,...),
value INTEGER
}
ChannelId::= INTEGER {
obu (0),
sam1 (1), -- secure application module
sam2 (2),
icc (3), -- integrated circuit(s) card
display (4),
buzzer (5),
printer (6),
serialInterface (7), -- serial interface: eg. RS232 and RS485
parallelInterface (8),
gPS (9),
tachograph (10),
privateUse1 (11), -- free for proprietary use
privateUse2 (12), -- free for proprietary use
privateUse3 (13), -- free for proprietary use
privateUse4 (14), -- free for proprietary use
privateUse5 (15), -- free for proprietary use
bluetooth (16)
-- (17-255) are reserved for future CEN use
} (0..255)
ChannelRq::= SEQUENCE{
channelId ChannelId,
apdu OCTET STRING
-- format according to the interface
-- of the channelId
}
ChannelRs::= SEQUENCE{
channelId ChannelId,
apdu OCTET STRING
-- format according to the interface
-- of the channelId
}
CopyRq::= SEQUENCE {
destinationEID INTEGER(0..127,...),
attributeIdList AttributeIdList
}
CreditRq::= SEQUENCE {
refund PaymentFee,
nonce OCTET STRING,
key INTEGER(0..255)
}
CreditRs ::= SEQUENCE {
creditResult ResultFin,
creditAuthenticator OCTET STRING
}
DebitRq::= SEQUENCE {
debitPaymentFee PaymentFee,
nonce OCTET STRING,
keyRef INTEGER(0..255)
}
DebitRs ::= SEQUENCE {
debitResult ResultFin,
debitAuthenticator OCTET STRING
}
GetInstanceRq ::= SEQUENCE {
posOfFirstInstance INTEGER(0..255),
-- position of first instance to be retrieved
posOfLastInstance INTEGER(0..255),
-- position last instance to be retrieved
attributeIdList AttributeIdList
-- Ids of attributes to be retrieved
}
GetInstanceRs::= SEQUENCE (SIZE (0..127,...)) OF SEQUENCE {
attributeId INTEGER(0..127,...),
-- number of instances retrieved
attributeValues Container (WITH COMPONENTS {octetstring PRESENT})
-- The octetstring shall contain the contatenation of
-- the unaligned PER encodings of the values of the
-- instances, with each encoding padded to an integral
-- of octets as specified for a top-level type in
-- ISO/IEC 8825-2
}
GetStampedRq::= SEQUENCE {
attributeIdList AttributeIdList,
nonce OCTET STRING, -- e.g. a random number
keyRef INTEGER(0..255)
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
}
GetStampedRs::= SEQUENCE {
attributeList AttributeList,
authenticator OCTET STRING
}
SetInstanceRq ::= SEQUENCE {
posOfInstance INTEGER(0..255),
attribute Attributes
}
52
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
SetMMIRq::= INTEGER {
ok (0), -- operation / transaction successfully completed
nok (1), -- operation / transaction not successfully completed
contactOperator (2), -- e.g. due to low balance or battery
noSignalling (255) -- no signalling
-- (3-127) are reserved for future CEN use
-- (128-254) are reserved for private use
} (0..255)
SetStampedRq::= SEQUENCE {
attributeList AttributeList,
nonce OCTET STRING,
keyRef INTEGER(0..255)
}
SubRq::= SEQUENCE {
attributeId INTEGER(0..127,...),
value INTEGER
}
-- NOTE: The following are the definitions of EFC attributes
CO2EmissionValue ::= Int2
ContractSerialNumber ::= Int4
ContractAuthenticator ::= OCTET STRING
ContractValidity ::= SEQUENCE {
contractRestrictions OCTET STRING (SIZE(4)),
contractExpiryDate DateCompact
} -- intended to support ENV implemented systems
ContractVehicle ::= LPN
DateCompact::= SEQUENCE {
year INTEGER (1990..2117),
month INTEGER (0..12), -- Value zero shall not be used
-- except with 1990 - see below.
day INTEGER (0..31) -- Value zero shall not be used
-- except with 1990 – see below.
}
-- The value "{year 1990, month 0, day 0}" is a 16-bit all-zero
-- encoding, and is used to represent "no date".
DescriptiveCharacteristics ::= INTEGER {
noEntry (0),
vehicleShape1 (1),
vehicleShape2 (2),
vehicleShape3 (3),
vehicleShape4 (4),
vehicleShape5 (5),
vehicleShape6 (6),
vehicleShape7 (7),
vehicleShape8 (8),
vehicleShape9 (9),
vehicleShape10 (10),
vehicleShape11 (11),
vehicleShape12 (12),
vehicleShape13 (13),
vehicleShape14 (14),
vehicleShape15 (15),
vehicleShape16 (16),
vehicleShape17 (17),
vehicleShape18 (18),
vehicleShape19 (19),
vehicleShape20 (20),
vehicleShape21 (21),
vehicleShape22 (22),
vehicleShape23 (23),
vehicleShape24 (24),
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
vehicleShape25 (25),
vehicleShape26 (26),
vehicleShape27 (27),
vehicleShape28 (28),
vehicleShape29 (29),
vehicleShape30 (30),
vehicleShape31 (31),
vehicleShape32 (32),
vehicleShape33 (33),
vehicleShape34 (34),
vehicleShape35 (35),
vehicleShape36 (36),
vehicleShape37 (37),
vehicleShape38 (38),
vehicleShape39 (39),
vehicleShape40 (40),
vehicleShape41 (41),
vehicleShape42 (42),
vehicleShape43 (43),
vehicleShape44 (44),
vehicleShape45 (45),
vehicleShape46 (46),
vehicleShape47 (47),
vehicleShape48 (48),
vehicleShape49 (49),
vehicleShape50 (50)
-- (51..255) are reserved for future CEN use
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
Copyright International Organization for Standardization 54 © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
reservedForUse3 (15),
reservedForUse4 (16),
reservedForUse5 (17),
reservedForUse6 (18),
reservedForUse7 (19),
reservedForUse8 (20),
reservedForUse9 (21),
reservedForUse10 (22),
reservedForUse11 (23),
reservedForUse12 (24),
reservedForUse13 (25),
reservedForUse14 (26),
reservedForUse15 (27),
reservedForUse16 (28),
reservedForUse17 (29),
reservedForUse18 (30),
reservedForUse19 (31),
reservedForUse20 (32),
reservedForUse21 (33)
} -- 6 bits, latinAlphabetNo1 recommended -- ,
-- refer to Annex E for conversion from LatinAlphabetNo 2
-- and 5 to Latin AlphabetNo1
licencePlateNumber OCTET STRING
}
PassengerCapacity ::= SEQUENCE{
numberOfSeats Int1,
numberOfStandingPlaces Int1
}
PaymentFee ::= SEQUENCE {
-- The fee (toll, charge or fare) which is requested by the
-- service provider for the service provided or to be provided.
paymentFeeAmount Int2,
-- paymentFeeAmount is the value of the fee being charged for the
-- service. If no unit (payment fee unit) is specified, then
-- it is known by default.
paymentFeeUnit PayUnit
-- paymentFeeUnit is the unit in which the fee is expressed.
}
PaymentMeans ::= SEQUENCE {
personalAccountNumber PersonalAccountNumber,
paymentMeansExpiryDate DateCompact,
pamentMeansUsageControl OCTET STRING(SIZE(2))
-- issuer's specified restrictions, on the geographic usage
-- and services allowed for the applications
}
PaymentMeansBalance ::= SignedValue
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
56
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
ResultFin ::= OCTET STRING (SIZE(1))
-- A code designating whether a card transaction was completed successfully
-- or not. Value Assignment : Hexadecimal
-- Most significant 4 bits: 0 OK :
-- '0x'H OK
-- Most significant 4 bits > 0 Not OK :
-- '1x'H Not OK, not specified further
-- '2x'H Not OK, Abnormal (First or Previous) Event
-- '3x'H Not OK, Contract not accepted
-- '4x'H Not OK, Account or Purse not accepted
-- 'x0'H not specified further
-- 'x1'H Balance close to zero
-- 'x2'H Balance now negative
-- 'x3'H Balance Overflow
-- 'x4'H Provider not accepted
-- 'x5'H Authentication failure
-- x6'H Vehicle Class incorrect
58
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
60
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
DSRCData {iso standard 14906 modules (0) dsrc (1) version (1)}
DEFINITIONS AUTOMATIC TAGS ::= BEGIN
EXPORTS ALL;
IMPORTS GetStampedRq,GetStampedRs,SetStampedRq,GetInstanceRq,
GetInstanceRs,SetInstanceRq,SetMMIRq,ChannelRq,ChannelRs,CopyRq,
SubRq,AddRq,DebitRq,DebitRs,CreditRq,CreditRs,
EFC-ContextMark,ContractSerialNumber,ContractValidity,
ContractVehicle,ContractAuthenticator,ICC-Id,
ReceiptServicePart,SessionClass,SignedValue,ReceiptServiceSerialNumber,
ReceiptFinancialPart,ReceiptContract,ReceiptOBUId,ReceiptICC-Id,
ReceiptText,ReceiptAuthenticator,ReceiptDistance,LPN,VehicleClass,
VehicleDimensions,VehicleAxles,VehicleWeightLimits,
VehicleWeightLaden,VehicleSpecificCharacteristics,
VehicleAuthenticator,EquipmentOBUId,
EquipmentStatus,DriverCharacteristics,
PaymentMeans,PaymentMeansBalance,PaymentMeansUnit,
PaymentSecurityData,PersonalAccountNumber,ReceiptData1,
ReceiptData2,SessionLocation,ValidityOfContract, AxleWeightLimits,
PassengerCapacity, Engine, SoundLevel, ExhaustEmissionValues,
DieselEmissionValues, CO2EmissionValue, VehicleTotalDistance,
TrailerLicencePlateNumber, TrailerCharacteristics, ActualNumberOfPassengers
FROM EfcModule
{iso standard 14906 modules (0) efc (0) version (1)}
CS5
FROM AVIAEINumberingAndDataStructures
{iso(1) standard(0) 14816 };
-- defined in ISO 14816 --
-- EXPORTS everything;
Action-Request::= SEQUENCE{
mode BOOLEAN,
eid Dsrc-EID,
actionType ActionType,
accessCredentials OCTET STRING (SIZE (0..127,...))
OPTIONAL,
actionParameter Container OPTIONAL,
iid Dsrc-EID OPTIONAL
}
Action-Response::= SEQUENCE{
fill BIT STRING (SIZE(1)),
eid Dsrc-EID,
iid Dsrc-EID OPTIONAL,
responseParameter Container OPTIONAL,
ret ReturnStatus OPTIONAL
}
ActionType::=INTEGER (0..127,...)
-- 0 : getStamped
-- 1 : setStamped
-- 2 : getSecure
-- 3 : setSecure
-- 4 : getInstance
-- 5 : setInstance
-- 6 : getNonce
-- 7 : setNonce
-- 8 : transferChannel
-- 9 : copy
-- 10 : setMMI
-- 11 : substract
-- 12 : add
-- 13 : debit
-- 14 : credit
-- 15 : echo
-- (16..118) Reserved for ISO/CEN use
-- (119-127) Reserved for private use
ApplicationContextMark::=Container
(WITH COMPONENTS {octetstring PRESENT})
-- The contents of the octetstring shall be an aligned PER
-- encoding of EFC-Contextmark, but this encoding may be followed
-- by non-standardised encodings. Illustrations of the inclusion
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
-- of non-standardised encodings are shown in annex B.
ApplicationList::=SEQUENCE (SIZE (0..127,...)) OF
SEQUENCE {
aid DSRCApplicationEntityID,
eid Dsrc-EID OPTIONAL,
parameter ApplicationContextMark OPTIONAL
}
AttributeIdList::=SEQUENCE (SIZE(0.. 127,...)) OF INTEGER(0..127,...)
AttributeList::=SEQUENCE (SIZE(0..127,...)) OF Attributes
Attributes::=SEQUENCE {
attributeId INTEGER (0..127,...),
attributeValue Container
}
BeaconID::=SEQUENCE{
manufacturerid INTEGER(0.. 65535),
individualid INTEGER(0..134217727)
} -- for registration of manufacturerid see [Link]/cen278
BroadcastPool::=SEQUENCE{
directoryvalue Directory,
content SEQUENCE (SIZE(0..127,...)) OF File
}
BST::=SEQUENCE{
rsu BeaconID,
time Time,
profile Profile,
mandApplications ApplicationList,
nonmandApplications ApplicationList OPTIONAL,
profileList SEQUENCE (SIZE(0..127,...)) OF Profile
}
62
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
Container::=CHOICE{
-- The alternative for container and its value is determined
-- from the service primitives.
integer [0] INTEGER,
bitstring [1] BIT STRING,
octetstring [2] OCTET STRING (SIZE (0..127), ...),
universalString [3] UniversalString,
beaconId [4] BeaconID,
t-apdu [5] T-APDUs,
dsrcApplicationEntityId [6] DSRCApplicationEntityID,
dsrc-Ase-Id [7] Dsrc-EID,
attrIdList [8] AttributeIdList,
attrList [9] AttributeList,
broadcastPool [10] BroadcastPool,
directory [11] Directory,
file [12] File,
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
64
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
Event-Report-Request::= SEQUENCE{
mode BOOLEAN,
eid Dsrc-EID,
eventType EventType,
accessCredentials OCTET STRING (SIZE(0..127,...)) OPTIONAL,
eventParameter Container OPTIONAL,
iid Dsrc-EID OPTIONAL
}
Event-Report-Response::= SEQUENCE{
fill BIT STRING (SIZE(2)),
eid Dsrc-EID,
iid Dsrc-EID OPTIONAL,
ret ReturnStatus OPTIONAL
}
EventType::=INTEGER{
release (0)
-- (1..118) are reserved for ISO/CEN use
-- (119..127) are reserved for private use
}(0..127,...)
File::=SEQUENCE(SIZE(0..127,...)) OF Record
FileName::=SEQUENCE{
aseID Dsrc-EID,
fileID INTEGER(0..127,...)
}
Get-Request::=SEQUENCE{
fill BIT STRING (SIZE(1)),
eid Dsrc-EID,
accessCredentials OCTET STRING (SIZE(0..127,...)) OPTIONAL,
iid Dsrc-EID OPTIONAL,
attrIdList AttributeIdList OPTIONAL
}
Get-Response::=SEQUENCE{
fill BIT STRING (SIZE(1)),
eid Dsrc-EID,
iid Dsrc-EID OPTIONAL,
attributelist AttributeList OPTIONAL,
ret ReturnStatus OPTIONAL
}
Initialisation-Request::= BST
Initialisation-Response::= VST
NamedFile::=SEQUENCE{
name FileName,
file File
}
ObeConfiguration::=SEQUENCE{
equipmentClass INTEGER(0..32767),
manufacturerID INTEGER(0..65535),
obeStatus INTEGER(0..65535) OPTIONAL
-- obeStatus shall always be present. Bit nr 5 of the first octet may indicate
the
-- status of the battery: 0 indicates OK, 1 indicates low (xxxB xxxx'H)
}
Profile::= INTEGER {
profile0 (0), -- DSRC Profile 0 as defined in EN 13372
profile1 (1) -- DSRC Profile 1 as defined in EN 13372
-- (2..118) are reserved for ISO/CEN use,
-- (119..127) are reserved for private use
}(0..127,...)
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
Record::=CHOICE{simple VisibleString,
...
}
ReturnStatus::=INTEGER {
noError (0),
accessDenied (1),
argumentError (2),
complexityLimitation (3),
processingFailure (4),
processing (5),
chainingError (6)
-- (7..127) are reserved for future CEN use
}(0..127,...)
Set-Request::=SEQUENCE{
fill BIT STRING (SIZE(1)),
mode BOOLEAN,
eid Dsrc-EID,
accessCredentials OCTET STRING (SIZE(0..127,...)) OPTIONAL,
attrList AttributeList,
iid Dsrc-EID OPTIONAL
}
Set-Response::=SEQUENCE{
fill BIT STRING (SIZE(2)),
eid Dsrc-EID,
iid Dsrc-EID OPTIONAL,
ret ReturnStatus OPTIONAL
}
Time::=INTEGER(0..4294967295)
-- “UNIX time”: number of seconds since midnight at the
-- start of 1st January 1970
T-APDUs::= CHOICE{
action-request [0] Action-Request,
action-response [1] Action-Response,
event-report-request [2] Event-Report-Request,
event-report-response [3] Event-Report-Response,
set-request [4] Set-Request,
set-response [5] Set-Response,
get-request [6] Get-Request,
get-response [7] Get-Response,
initialisation-request [8] Initialisation-Request,
initialisation-response [9] Initialisation-Response
}
VST::=SEQUENCE{
fill BIT STRING (SIZE(4)),
profile Profile,
applications ApplicationList,
obeConfiguration ObeConfiguration
}
END
-- Below imported data from ISO 14816's ASN.1 module
-- AVIAEINumberingAndDataStructures {iso(1) standard(0) 14816 }
-- DEFINITIONS AUTOMATIC TAGS ::= BEGIN
-- EXPORTS ALL;
-- CS5 ::= VisibleString
-- CountryCode ::= BIT STRING(SIZE(10))
-- Value assignment is done in accordance with ISO 3166-1 and by
-- using the ITA.2 alphabet.
-- IssuerIdentifier ::= INTEGER(0 .. 16383)
-- See Annex A of ISO 14816 for registration
-- END
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
66
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
Annex B
(informative)
CARDME transaction
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
B.1 General
Annex B provides an informative example of a transaction by specifying the CARDME transaction. First a
transaction overview is given in B.2. The transaction phases and the data exchanges are subsequently
defined in B.3. Finally, the bit-level specification is accounted for in B.4.
B.2 Overview
B.2.1.1 General
When a user enters a manual tolling station, four phases can be discerned. The electronic CARDME
transaction consists of the same four phases, as shown in Table B.1.
Initialisation “Hello, welcome, where do you come from, how do you want to pay”
Negotiation of the EFC contract to use.
Presentation “Please give me your payment details and your entry ticket”
The RSE reads OBE data (details on contract, account, vehicle
classification, last transaction, etc.).
Irrespective of EFC station type (passage in open system, entry or exit in closed system) the transaction
performed is always the same. Although the functionality of the different station types is quite different, there is
a single CARDME transaction, which is identical at all locations.
EFC beacons continually emit a signal in order to make contact to newly approaching vehicles. The data in
this periodic signal is called the Beacon Service Table (BST).
As soon as a vehicle receives a BST, it answers with its Vehicle Service Table (VST). The VST contains a list
of all EFC-contracts present in the OBE.
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
68
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
Upon reception of the VST the RSE analyses its contents and decides whether it accepts one of the EFC
contracts presented by the OBE. In case the RSE accepts a contract, it knows exactly what to do from then on.
The RSE knows which organization has issued the contract, and hence, where to send the claim and which
transaction type is supported by the OBE. Although the RSE may have software available for several different
EFC applications (e.g. software routines for the local EFC application and the CARDME application), only one
piece of software executes at a time. The initialisation phase can be seen as a switch where the RSE decides
which path to follow. From the initialisation onwards, the RSE will (for a certain OBE) address a single EFC
contract only.
If however, the RSE cannot accept one of the EFC contracts presented by the OBE, the transaction will be
terminated. As no information regarding the identity of the user has been exchanged at this point, the local
exception handling procedures will be initiated.
An example of the information exchange in the initialisation phase - between a beacon at a French tolling
station and an OBE inside a Norwegian vehicle – is given in Table B.2 below.
Transaction Operator
In order to know which tariff to apply and which account to charge, the RSE requires some additional
information from the passing OBE. The RSE obtains this information via “read commands” sent over the
DSRC link.
NOTE The RSE addresses only data from the contract that it has chosen to use in the preceding initialisation phase
(“CARDME/NorwegTrans” in our example).
The RSE uses the retrieved data for the following purposes:
Payment means including the personal account number: The account held at the issuer of the contract is
identified through the personal account number. The personal account number points to exactly one
customer account held with a Contract Issuer in Europe. This information enables the EFC Operator to
draw money from the account of a local user or to claim money from the Contract Issuer of a foreign user.
Previous receipts: Two receipts, associated with the two most recent passages through EFC CARDME
stations, are read from the OBE memory. (When an OBE passes an EFC station, a new Receipt is written
into the OBE memory. See also the explanation of the Receipt Phase in B.2.1.4 below).
In a classical manual closed tolling system a user takes a ticket from an automatic ticket dispensing
machine when he enters the motorway. At the exit the user shows this ticket to the tolling personnel, who
calculates the fee from the distance matrix entry-exit. The same thing happens electronically. Some
systems also require the last but one receipt to determine the fee. This is especially the case when there
are alternative routes through the (motorway) network.
In an open toll system, where one pays per passage of a bridge, a mountain pass or a stretch of
motorway, reading the last receipt is of little use to the RSE. In CARDME it is done anyway, in order to
have the same transaction everywhere, regardless of station type.
Vehicle classification details: In some systems, the applicable tariff is determined from the vehicle class
measured at the tolling station. In other systems, vehicle class is determined from the data in OBE (the so
called 'declared classification”). These OBE-declared vehicle-related data are read out here. The
declared vehicle characteristics are sufficient for any RSE to determine the applicable tariff. Systems that
measure class can simply ignore these data.
Signature: The OBE adds several security-related data to the tolling data, here simply called 'Signature'.
CARDME foresees several different such security data, and even an optional second read-command for
roaming users, in order cover all security needs. These security measures are discussed in a separate
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
70
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
chapter. In CARDME it is mandatory for OBEs to produce these security-related data. It is important to
note, however, that using the security data is optional in the sense that the roadside may simply ignore
them. From a technical point of view, every operator is free to decide which of the security data he wants
to check, when and where he wants to check them, and whether he wants to check them at all.
In the previous phases the RSE has read all data that are required to charge the user (either directly for local
users or indirectly for roaming users, which are charged via their contract issuers).
The receipt phase is used to write all data to the OBE that are to be carried to the next tolling station (“you can
only read what you have written before”). It is also time to inform the user about the success of the tolling
transaction.
“I confirm. I have stored the ticket and I have given the user
a signal”.
The most important data that have to be written into the OBE is the entry ticket. In closed tolling systems it is
essential that this information is carried from one tolling station to the next. Also for other system types it
makes sense to give an electronic receipt. This receipt is not primarily intended as direct information for the
user since only very few OBEs have the capability to display the rather complex receipt information. The
receipt rather serves as a record of past transactions in case a dispute arises.
It is recommended to store the two latest receipts in the OBE. These are transmitted over the DSRC link as
“ReceiptData1” and “ReceiptData2”. The RSE keeps track of what is old and what is new, and not the OBE in
order to have a simple OBE design. The RSE always reads and writes both receipts. When writing, the RSE
writes the new receipt to ReceiptData1 and it copies the data just read under ReceiptData1 (in the
presentation phase) to ReceiptData2.
passage location (EFC operator, station number, lane number, station type);
passage result (OK/not OK, wrong class, blacklisted, security error, etc.);
used contract.
In addition, the user is informed about the transaction result. The OBE signals to the user one of three
messages: “OK”, “not OK” and “Contact Operator”. Also in the Write-Phase there is security-related
information added to the data.
At this stage in the transaction all tolling–related data exchange is completed. A failure of the transaction is no
longer possible.
There are only some technical housekeeping tasks required, namely to track the vehicle through the
communication zone (mainly required in free-flow installations with video-enforcement) and/or to formally
close the transaction, i.e. telling the OBE that there is no more to come.
B.3.1 Overview
Table B.5 below provides an overview of the CARDME transaction in terms of the sequence of DSRC
application layer functions (such as INITIALISATION, GET, SET and EVENT-REPORT), EFC functions and
data exchanged between an RSE and an OBE. The subsequent subclauses give details of exchanged EFC
application data.
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
72
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
x Operator_Authenticator Authenticator calculated with the interoperable
(Auth_Op) key, i.e. with a key known to all EFC Operators
[Link]
GET_STAMPED.request o For OBEs from a foreign Contract Issuer, the
Optional AC_CR [Access Credential Key] RSE asks for the calculation of an additional
Presentation x PaymentMeans incl. authenticator over the Personal Account
for Foreign PersonalAccountNumber Number with keys only known to the Contract
OBEs (RndRSE, KeyRef_Iss)
Issuer, so that one can prove that the vehicle
actually has passed.
m GET_STAMPED.response
x Issuer_Authenticator
(Auth_Iss)
[Link] o Write new receipts (or entry ticket).
x ReceiptData1 Write new status information and increment
Receipt x ReceiptData2 transaction counter.
(SET) x EquipmentStatus Transmit textual information, which may be
x ReceiptText
displayed to the user.
SET_MMI.request
Give an „OK“ indication to the user (normally
the OBE will beep).
m [Link]
Set_MMI.response
Tracking [Link] o Track OBE by exchanging dummy information.
And m [Link] The usage of Echo is by optional, at the
discretion of the RSE, and may be repeated.
Closing EVENT_REPORT.request o RSE closes transaction and releases OBE.
(Release)
Table B.6 provides details of the data exchanged between an RSE and an OBE in the initialisation phase.
Table B.6 — Initialisation phase
Phase RSE OBE
[Link] (BST) o
m [Link] (VST)
x EFC-ContextMark:
Initialisation ContractProvider
TypeOfContract
ContextVersion
x EFC-ContextMark:
ContractProvider
TypeOfContract
ContextVersion
x AC_CR-KeyReference:
AC_CR-MasterKeyReference
AC_CR-Diversifier
x RndOBE
NOTE1 The above data exchange is described on application level. There are also more technical negotiations going
on between RSE and OBE, e.g. in order to arrive at a mutually agreed DSRC communication profile, determining amongst
other parameters which subcarrier frequency the OBE shall use on uplink.
NOTE2 RSE may issue a command Event-Report Release, according to Layer 7, in case it does not recognizes the
EFC Context mark received by the OBE to avoid disturbance created by unknown OBE.
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
Copyright International Organization for Standardization 74 © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
ContractProvider: A code standing for the Contract Issuer (the code contains the country of residence of
the Contract Issuer and a national assigned number identifying the individual issuer).
TypeOfContract: A data element that gives the RSE basic information on the EFC contract residing in the
OBE (e.g. central account or on-board purse; pre- or post-paid; unlimited or restricted to a certain
concession area; discount tariff applies). Within CARDME currently only one type of contract is defined,
namely the “CARDME European central account transaction”.
ContextVersion: This data element is used by the OBE to tell the RSE the Version of some data it
contains. For CARDME it says something like “I am built according to CARDME-4 Specification V1.0, and
I have been initialised using interoperable Security Key Version 3”.
In addition to the mandatory contents above, the ContextMark may contain further information. CARDME
makes use of this feature and has defined the following additional data as part of the OBE response in the
CARDME ContextMark.
AC_CR-KeyReference: A reference number that tells the RSE which keys to use when calculating the
Access Credentials. CARDME supports both key generations and key diversification.
RndOBE: This data element (“random number generated by the OBE”) contains a number that is freely
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
chosen by the OBE and not predictable by the RSE. The number has to be used by the RSE when
calculating the Access Credentials. This guarantees that the RSE has to calculate the Access Credentials
afresh for each session. By this it is avoided that someone erects an un-authorised beacon using Access
Credentials he obtained through listening to correct EFC transactions.
Note that the VST contains no data that might have privacy implications. The VST is accessible to any
standards-conformant beacon. It can neither be forbidden nor technically prevented that any interested party
reads VST information. Hence, in CARDME the VST contains no information that allows identification of the
vehicle.
B.3.3.1 General
Table B.7 provides details of the data exchanged between an RSE and an OBE in the presentation phase.
GET_STAMPED.request o
AC_CR [Access Credential Key]
x PaymentMeans incl.
PersonalAccountNumber
(RndRSE, KeyRef_Op)
[Link]
Presentation AC_CR [Access Credential Key]
x ReceiptData1
x ReceiptData2
x EquipmentStatus
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
x Classification data:
VehicleClass
VehicleDimensions
VehicleAxles
VehicleLicencePlateNumber
VehicleWeightLimits
VehicleSpecificCharacteristics
m GET_STAMPED.response
Operator_Authenticator
(Auth_Op)
[Link]
1) Account information - static. Data that allow the EFC Operator to claim money from a user account
held with a financial institution or with a Contract Issuer.
2) Information about the last passage - dynamic. The RSE reads data that have been written at the
last tolling station. At the exit of a closed tolling system these data constitute the entry ticket, which
was written by the DSRC beacon on entry. On other stations the data are normally ignored.
3) Vehicle classification information - static. In tolling systems which rely on declared classification
to determine tariff, vehicle classification information has to be read from the OBE. Also in systems
relying on measured class, classification information read from the OBE is sometimes used for
verification.
4) Security related information – dynamic. The CARDME transaction enables several security
mechanisms, without making them mandatory to use by the RSE. The different mechanisms address
different security requirements. If one decides not to use some of the mechanisms, the related
security data can simply be ignored by the RSE, respectively dummy data can be transferred.
76
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
PaymentMeans incl. PersonalAccountNumber: Points to a user account held at the Contract Issuer
(which is already known from the Initialisation Phase). The EFC Operator will send his claim to this
account. Contains also expiry date and restrictions of the payment means.
Information about the last passage is mainly required when exiting a closed tolling system. In this case the
information sent by the OBE is the “entry ticket” written when the vehicle entered the tolled system.
ReceiptData1: The “Ticket” written by the last beacon passed. This attribute contains both the class that
was declared at the last transaction and the class that was actually used (e.g. measured). When used as
part of an entry ticket, this information enables the exit station to find out whether the class has changed
during the trip. The attribute ReceiptData1 also contains the data element ReceiptAuthenticator, which
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
contains data that have been calculated by the last beacon in order to “sign” the ticket given. The RSE
may use this authenticator to check that the (entry-)ticket has not been manipulated, especially that the
entry point has not been changed. In addition the authenticator can be used as a kind of “indirect
authentication of the previous beacon”. The Receipt Authenticator is both produced and checked with a
local algorithm and with local keys, i.e. with keys that are not distributed to any third party. The procedure
is fully in the realm of an EFC operator's local system, and the authenticators are both calculated and
checked by his own beacons only. The OBE merely transports this authenticator from one beacon to the
next. Operators are free to use this security service, simply ignore it (i.e. by writing empty authenticators
in the Receipt Phase and not checking the authenticators read in the Presentation Phase) or even use it
for other purposes. In this use, the Receipt Authenticator serves as a free field where an EFC Operator
may transport some local data from one beacon to the next.
ReceiptData2: The “Ticket” of the penultimate beacon (last but one). In some systems two receipts are
required to find which of two alternative routes the vehicles has passed.
CARDME foresees a list of declared classification data that tries to cover a maximum of needs while
remaining as short as possible. Keeping the list of classification data short is not required for technical
reasons – a few bytes more or less over the DSRC link make little difference – but for cost reasons upon
personalisation of the OBE. In order to be as flexible as possible, CARDME has devised an adaptable concept
to treat classification.
VehicleClass: Vehicle Class is a very simple and well known data element which in CARDME is used in
the following way: Vehicle Class covers three purposes: (1) it gives the local class in the “home system”
of the Contract Issuer; (2) for clear-cut cases it gives simple “European harmonised classes”, avoiding to
have the more complex extended declared characteristics present; (3) it states whether a trailer is present
or not.
CARDME enables several security mechanisms, which are designed to protect the individual security
requirements of the different entities in the CARDME architecture. The security level is adaptable from the
RSE point of view – all security measures can either be used or be disregarded by the RSE.
AccessCredentials: In CARDME all access to OBE data (both read and write) is protected with Access
Credentials (AC_CR). The RSE has to send the right Access Credentials before the OBE accepts a
command. The RSE calculates the Access Credentials dynamically using a challenge produced by the
OBE (see B.3.1 Initialisation phase). The required keys need to be known by all partners of the MoU.
Because of the wide distribution of the keys, it is indispensable that these keys are diversified (different
OBE have different keys) and that there are key generations (new keys are used from time to time).
NOTE 1 How to do without AccessCredentials? CARDME foresees one generation of Access Credentials (“Generation
0”) which is openly known to all. OBEs or rather contracts with these Access Credentials can be read by everybody. It is
left to the Contract Issuer policy (and presumably to agreements in the MoU) whether he issues such OBEs or not.
NOTE 2 How to do without OBE_Authenticator? There is no need from technically reasons to check this Authenticator.
It is automatically produced by the OBE, but EFC Operators that do not wish to perform such a security check are free not
to check the authenticator in their RSE (at least from a technical viewpoint – they might be obliged to do so contractually,
say through contracts with associated issuers or through the interoperability MoU). One possible reason why an operator
does not to want check this authenticator is when he adds the CARDME transaction onto his existing RSE which has no
appropriate key storage and security handling facilities. At some point in time, e.g. when he routinely replaces some of his
older equipment, he can decide to go for higher security.
ReceiptAuthenticator (contained in the ReceiptData-attributes): This RSE signature under the receipt has
already been treated above under “Information about the last passage”.
EquipmentStatus: In CARDME this data element serves as a very simply but effective security measure,
namely as a simple transaction counter. According to this EFC application standard (ISO 14906) the
coding of the data element 'EquipmentStatus” is left to the operator (it says 'operator-specific EFC-
application information pertaining to the status of the equipment”). The data element provides for 16 bits.
CARDME recommends that operators agree to reserve 4 bits for their private local use (e.g. for
management of the transaction in their own system, containing information like 'next suitably equipped
gantry should make an enforcement picture”), and to leave 12 bits for a transaction counter (0...4095).
CARDME proposes that each communication between RSE and OBE should be counted and a record of
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
this maintained in the OBE, thereby increasing the practicalities of proving some instance of fraud (e.g. on
the part of an operator by duplicating transactions at RSE, especially when he makes use of the low-
security mode of operation optionally allowed for in CARDME. The transaction counter also helps
identifying instances when cryptographic security is broken – a very important system performance
monitoring facility.).
The RSE of every EFC operator signed up to the MoU reads the Equipment Status in the Presentation
Phase, increments the counter, and writes the new value back to the OBE in the Receipt Phase.
78
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
Table B.8 provides details of the data exchanged between an RSE and an OBE in the optional presentation
phase.
GET_STAMPED.request o
(RndRSE, KeyRef_Iss)
m GET_STAMPED.response
Nowadays it is very often the case that the EFC Operator and the Contract Issuer is one and the same
organization. Very often the operator issues the OBE with the contract inside. In this case, the security
information passed in the presentation phase (see B.3.3) is sufficient.
In case these two organizations are different, and especially when they are organizationally strongly
separated, e.g. reside in different countries (which is normal in a roaming environment) or are totally different
entities altogether (e.g. a tolling operator and a bank) a new security requirement arises. In the presentation
phase, the EFC Operator was able to check through the Operator_Authenticator that the OBE (or rather the
Contract in the OBE) is a genuine one, i.e. from an organization belonging to the MoU. He will then send a
claim to the Contract Issuer asking for money. The Contract Issuer now has no means to really check this
claim. He has no indisputable proof for his customer, the user that drove the vehicle, that the money he asks
for actually corresponds to a passage somewhere.
Every RSE knows from the data element “ContractProvider” in the ContextMark of the VST, whether it is
communicating with a local or a foreign vehicle. Only for foreign vehicles the RSE executes this optional
presentation phase. The sole purpose of this phase is to obtain an Authenticator from the OBE. This
Authenticator should be calculated by the OBE with keys only known to the Contract Issuer. The (foreign) EFC
Operator, where the vehicle passes, can neither check nor forge this authenticator. The EFC Operator simply
adds this authenticator to the transaction record he sends as a claim to the Contract Issuer in order to be
reimbursed. The Contract Issuer checks the Issuer_Authenticator in order to have proof that a vehicle for that
he is obliged to pay actually has passed a certain (foreign) EFC station. This both serves as a proof against
users trying to deny the passage and checks for a correct claim made by the foreign operator.
The challenge sent by the RSE (RndRSE) should not be a number freely chosen by the RSE. It should to be
prescribed and constructed in such a way that the RSE cannot influence its value. A concatenation of Date
and Time of passage would serve this purpose perfectly. This challenge has to be passed to the Contract
Issuer in the transaction record, together with the authenticator calculated by the OBE, in order to enable the
Contract Issuer to check the authenticator.
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
Table B.9 provides details of the data exchanged between an RSE and an OBE in the receipt phase.
[Link] o
ReceiptData1
ReceiptData2
Receipt
EquipmentStatus
ReceiptText
SET_MMI.request
m [Link]
Set_MMI.response
The data already treated in the presentation phase (see B.3.3), which are most of the data associated with the
Receipt Phase, are not treated again in this subclause. The data written to the OBE in the Receipt Phase and
treated in the presentation phase are:
ReceiptData2: The data read in ReceiptData1 the presentation phase are now written as ReceiptData2
(“old ticket”).
In addition, the user is informed about the success of the transaction. This is done twofold:
1) ReceiptText: The RSE may use this data element to send a short text message to the passing OBE
(maximum length 12 characters). It is not prescribed what the RSE shall say. The text might contain
some cost information (“EURO 2.00”), some station information (“ENTRY 24”), added value
information (“A55 CLOSED”), or may even be left blank.
NOTE Nowadays only few OBEs have a display, and very few OBEs will have the possibility (during the lifetime of
this version of the standard) to display this text information, so normally OBEs will simply disregard the information.
CARDME believes nevertheless that in many emerging systems it will be increasingly important to have the option to send
at least a short text message, consisting of a few text characters. Especially in systems with complex, time-dependent
tariffs for demand management purposes the user has to be informed about the actual cost of the current passage.
Otherwise variable tariffication would become pretty meaningless.
2) SET_MMI: With this command the RSE instructs the OBE to use its man-machine interface (MMI), to
signal the user one of three pre-defined messages, namely “OK”, “not OK” and “Contact Operator”. It
is up to the OBE how to signal these messages. Depending on OBE make, the OBE may beep, light
a signal lamp or even write something onto a display.
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
80
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
Table B.10 provides details of the sequence of data exchanged between an RSE and an OBE in the
tracking/closing phase.
Tracking [Link] o
Etc... m [Link]
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
In full multi-lane systems, a tracking phase is usually used to keep track of the vehicle after the EFC
transaction is finished (using the Echo service, which may be used several times). In systems requiring no
tracking, the session is closed with an explicit release in the Closing Phase.
Tracking and Closing are optional and used by RSE where required locally. All OBEs need to support these
functionalities.
B.4.1 General
Tables B.11 to B.23 below provides for the bit-level specification of the CARDME transaction. The
specification accounts for the complete frame content (excluding the zero-bit insertions) of the data
exchanged, including protocol information related to DSRC-L1, -L2 and –L7 in order to ensure a maximum
unambiguity of the CARDME transaction specification. The data that are associated with this International
Standard are highlighted in grey.
B.4.2 Initialisation
Bits in Octet
Attribute/Field b7 b0 Description
Bits in Octet
Attribute / Field B7 b0 Description
Bits in Octet
Attribute/Field B7 b0 Description
Copyright International Organization for Standardization 82 © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
Octet #
Table B.14 — Initialisation response (VST) frame content
Bits in Octet
Attribute/Field b7 b0 Description
44 ManufacturerId INTEGER (0..65535) 0000 0000 Manufacturer identifier. See ISO 14816 Register at
45 0000 0010 [Link]/cen278 for value assignment. Example : 210.
46 ObeStatus INTEGER(0..65535) 0000 0011 Example : 76810
47 }} 0000 0000
48 FCS xxxx xxxx Frame check sequence
49 xxxx xxxx
50 FLAG 0111 1110 End Flag
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
B.4.3 Presentation
Bits in Octet
Attribute/Field b7 b0 Description
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
24 } rrrr rrrr
25 KeyRef_Op(h) xxxx xxxx
h = Reference to AuKey_Op used for the computation of Operator
} } Authenticator.
26 Fragmentation header 1xxx x001 No fragmentation. Same PDU no as before (concatenation).
27 [Link] 0110 [Link]
SEQUENCE {
OPTION indicator 1 AccessCredentials present
OPTION indicator 0 IID not present
OPTION indicator 1 AttributeIdList present
Fill BIT STRING(SIZE(1)) 0 Set to 0
28 EID INTEGER(0..127,...) 0000 0101 No extension, EID, Example : 510
29 AccessCredentials OCTET STRING { 0000 0100 No extension, octet string length = 410
30 AC_CR aaaa aaaa Access credentials calculated by RSE using RndOBE and the
31 aaaa aaaa Access Credentials Key AC_CRKey.
32 aaaa aaaa
33 } aaaa aaaa
34 AttributeIdList SEQUENCE (SIZE(0..127,...)) OF { 0000 0110 No extension, number of attribute IDs = 610
INTEGER (0..127,...) AttributeId
35 VehicleLicencePlateNumber 0001 0000 No extension, AttributeId = 1610, VehicleLicencePlateNr
36 VehicleClass 0001 0001 No extension, AttributeId = 1710, VehicleClass
37 VehicleWeightLimits 0001 0100 No extension, AttributeId = 2010, VehicleWeightLimits
38 EquipmentStatus 0001 1010 No extension, AttributeId = 2610, EquipmentStatus
39 ReceiptData1 0010 0001 No extension, AttributeId = 3310, ReceiptData1
40 ReceiptData2 } } 0010 0010 No extension, AttributeId = 3410, ReceiptData2
41 FCS xxxx xxxx Frame check sequence
42 xxxx xxxx
43 FLAG 0111 1110 End Flag
NOTE VehicleSpecificCharacteristics, VehicleDimensions and Vehicle Axles are not included in the examples in this table.
84
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
Octet #
Table B.16 — Presentation response frame content
Bits in Octet
Attribute/Field b7 b0 Description
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
Bits in Octet
Attribute/Field b7 b0 Description
53 Attributes SEQUENCE {
AttributeId INTEGER(0..127,...) 0001 0100 No extension, AttributeId = 2010 = VehicleWeightLimits
54 Attribute Value CONTAINER { 0011 0100 No extension, Container choice = 5210
55 VehicleWeightLimits SEQUENCE {
VehicleMaxLadenWeight Int2 xxxx xxxx VehicleMaxLadenWeight
56 xxxx xxxx
57 VehicleTrainMaxWeight Int2 xxxx xxxx VehicleTrainMaxWeight
58 xxxx xxxx
59 VehicleWeightUnladen Int2 xxxx xxxx VehicleWeightUnladen
60 } } } xxxx xxxx
61 Attributes SEQUENCE {
AttributeId INTEGER(0..127,...) 0001 1010 No extension, AttributeId = 2610, EquipmentStatus
62 Attribute Value CONTAINER { 0011 1010 No extension, Container choice = 5810
63 EquipmentStatus BIT STRING(SIZE(16)) 0000 0000 EquipmentStatus value
64 } } 0000 0001
65 Attributes SEQUENCE {
AttributeId INTEGER(0..127,...) 0010 0001 No extension, AttributeId = 3310, ReceiptData1
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
Copyright International Organization for Standardization 86 © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
Bits in Octet
Attribute/Field Description
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
b7 b0
Bits in Octet
Attribute/Field b7 b0 Description
88
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
B.4.5 Receipt
Bits in Octet
Attribute/Field Description
b7 b0
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
Bits in Octet
Attribute/Field Description
b7 b0
Bits in Octet
Attribute/Field b7 b0 Description
90
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
Bits in Octet
Attribute/Field b7 b0 Description
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
2 Private LID xxxx xxx0 Link address of a specific OBE
3 xxxx xxx0
4 xxxx xxx0
5 xxxx xxx1
6 MAC control field 1010 s000 The frame contains a command LPDU
7 LLC control field n111 0111 Polled ACn command n bit
8 Fragmentation header 1xxx x001 No fragmentation.
9 [Link] 0000 [Link] ([Link])
SEQUENCE {
OPTION indicator 0 No Access Credentials
OPTION indicator 1 ActionParameter present
OPTION indicator 0 IID not present
Mode BOOLEAN 1 Mode = TRUE, Response expected
10 EID INTEGER (0..127,...) 0000 0000 No extension, EID = 0 (System Element)
11 ActionType INTEGER (0..127,...) 0000 1111 No extension, Action Type = 1510, [Link]
12 ActionParameter CONTAINER { 0000 0010 No extension, Container Choice = 210, Octet string
13 } } 0000 0000 No extension. String length = 0 octets
14 FCS xxxx xxxx Frame check sequence
15 xxxx xxxx
16 FLAG 0111 1110 End Flag
Bits in Octet
Attribute/Field b7 b0 Description
B.4.6.3 Closing
Bits in Octet
Attribute/Field b7 b0 Description
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
92
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
Annex C
(informative)
C.1 General
Annex C provides informative examples EFC transaction types, using the specified EFC functions and
attributes in this International Standard. Examples are given for the following transaction types:
The purpose of these examples is to demonstrate various transaction concepts, and illustrate how they are
supported by this International Standard.
NOTE Annex C is partly overlapping with the “Read and write EFC transaction”, as both a based on a “read and
write” centrally held account transaction. CARDME's transaction, in Annex B, includes dynamic security measures and a
more detailed specification.
RSE OBE
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
[Link](BST)
Notify Application
[Link](VST(…, ApplicationList=
(aid=EFC), eid, EFC-ContextMark),…)
[Link](VST)
Notify Application Beacon(…, eid,
EFC-ContextMark))
[Link](…,AttrldList(EquimentOBUld,
EquipmentICCId, VehicleClass,
ReceiptServicePart),…)
[Link](…)
[Link](…) GET,rq(…,AttrldList(EquimentOBUld,
EquipmentICCId, VehicleClass,
ReceiptServicePart),…)
Payment type verification
entry point data verification
black and/or white list checking
SET_MMI.rq(ok, Mode=False)
[Link](…,AttrList(ReceiptSessionPart,
SET_MMI.ind(..)
ReceiptFinancialPart), Mode=False,…)
signalling OK via OBE’s buzzer
TRANSFER_CHANNEL.rq(…,Channel=
Display,Value=Fee, Mode=False,…) [Link](...)
TRANSFER_CHANNEL.ind(…)
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
94
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
BST(aid=1, …)
VST(eid=1, EFC-ContextMark)
RSE operation
[Link](eid=1,Contract …, PaymentMeans
SET_NONCE.rq(eid=1, RSENonce, Mode=False)
GET_NONCE.rq(eid=1) [Link]
SET_NONCE.ind
GET_NONCE.ind
[Link](Contract…, PaymentMeans
GET_NONCE.rs(…)
[Link]
GET_NONCE.cf
RSE operation
[Link](eid=1,
AccessCredentials=OCTET STRING (see note)
debitFee=(amount, currency, multiplicator),
nonce = {}, keyre f=0)
[Link](debitAuthenticator=Signature(…),
debitResult, fill
[Link]
C.5.1 General
The example in Figures C.4 to C.12 demonstrates an EFC transaction using a TRANSFER_CHANNEL
command to handle an electronic purse.
C.5.2 Initialisation
To every available Payment Means and contract, the OBE transmits an EFC-ContextMark inside the VST (see
also 6.2.3). The order of the ContextMarks as delivered by the OBE implicitly contains the preference of the
User, i.e. the top most one should be selected by the RSE, if accepted.
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
BST
VST
The RSE selects the top most accepted PaymentMeans. Attributes will be addressed subsequently by means
of its unique EID (unless otherwise indicated, e.g. EID=0 will be used in addition). The ContextVersion will be
used to identify the EFC Key to be used during the session.
The static data (Vehicle Class etc.) and the last transaction information are read out. These data can be read
out without dynamic security mechanism, therefore a simple GET command is sufficient.
[Link](…)
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
[Link](…)
Figure C.5 — Read out static data and last transaction information
PaymentMeans (optional);
PaymentMeansUnit (optional);
ContractSerialNumber (optional);
ContractValidity (optional);
ContractVehicle (optional);
ContractAuthenticator (optional);
DriverCharacteristics (optional);
VehicleLicencePlateNumber (optional);
VehicleClass (optional);
VehicleDimensions (optional);
VehicleAxles (optional);
VehicleWeightLimits (optional);
VehicleWeightLaden (optional);
Copyright International Organization for Standardization 96 © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
VehicleSpecificCharacteristics (optional);
VehicleAuthenticator (optional).
Since the RSE is the issuer of the command, there is a flexibility and a migration path to further
extension/reduction of this list.
If the charge station is an exit station of a closed system, the appropriate entry ticket is read out. For this, a
random access mechanism for multiple instances of attributes is required.
GET_INSTANCE.rq(N,…)
GET_INSTANCE.rs(N,…)
An entrance ticket is of type ReceiptSessionPart. There are required at least 3 instances of this attribute under
the EID belonging to the EFC application.
Before any security measures can be performed, the random number generated by the OBE is read out:
GET_NONCE.rq()
GET_NONCE.rs(GetNonceRs)
C.5.6 Payment
Before the actual payment (e.g. debiting of the purse) is performed, some preparation is required in order to
cope with the aborted/incomplete transaction. Three commands from the RSE have to be combined
(concatenated respectively chained) in order to ensure either execution of all or none of them. These
commands are described in Figures C.8 to C.10.
First the session information together with a result code indicating that the transaction has reached this
intermediate state is written into the OBE system space (preliminary receipt):
[Link](EID=0, ReceiptServicePart)
The following command copies this information from the OBE system to the receipt store (e.g., on the ICC).
Let EID=y the target for the copy command.
[Link](ReceiptServicePart, EID=y)
Figure C.9 — Copying of the prliminary receipt from OBE space to the target system (e.g. ICC)
Now the actual payment is performed. It is assumed, that the device holding the on-board account
respectively the central account data can be accessed via a transparent channel.
TRANSFER_CHANNEL.rq(channelld, apdu)
TRANSFER_CHANNEL.rs(channelld, apdu)
applied tariff;
PaymentFee;
Security related data (NONCE for the OBE, NONCE previously retrieved from the OBE, Authenticator,
etc.).
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
The apdu in the response contains:
The receipt is written into the OBE using some security measures.
SET_SECURE.rq([Link])
SET_SECURE.rs([Link])
SetSecureRq contains:
ReceiptServicePart;
ReceiptServiceSerialNumber;
ReceiptFinancialPart;
ReceiptAuthenticator.
98
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
SET_MMI.rq(SetMMIRq)
It should be emphasised that steps 1 to 7 (Initialisation to User Information) do not require 7 down and up link
cycles of communication, since the application layer provides a means for concatenation of commands. From
an application point of view some information has to be present in the RSE before the next command can be
issued. Regarding this, the whole transaction can be organized using 4 down links. Table C.1 indicates which
commands can be concatenated.
NOTE The timing of the up links depends on the medium allocation strategy implemented in the RSE.
Command/Attribute Cycle
st
BST 1 down link
TRANSFER_CHANNEL.rs
(payment object )
SET_STAMPED.rq (ReceiptFinancialPart = 10 bytes, 4th down link
ReceiptAuthenticator = 4 bytes)
SET_MMI.rq
L2 Acknowledge from OBE Up link
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
C.6.1 General
This clause illustrates EFC transactions using muliple contracts, based on a scenario in which the user have 2
contracts (1 national and 1 local) issued by different regional motorway operators. The national contract is
based on a Post-Payment method whereas the local ones lie on an Account Debiting basis.
There are also some 'intermediate' gate type (called CheckPoint). These gates are used only for time-
stamping purposes either to identify unambiguously a trip (in case of multiple routes) or to avoid fraudulous
actions.
In the following examples, it is assumed that the OBE contains 2 subscriptions: a national one (EID=1) and a
local one (EID=2). The RSE chooses the subscription it will used to perform the session.
AP DSRC-L7 DSRC-L7 AP
Step 0:
BST(aid=1, …)
Step 1:
[Link](EID=1,
EFCContextMark
ContractSerialNumber
ContractValidity
ReceiptServicePart
EquipmentOBUId
PaymentMeansUnit )
[Link]
[Link](…)
[Link]
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
In most cases, the ReceiptServicePart will provide information about an entry station. For this example, we
assume that the ReceiptServicePart indicates “TypeOfSession=8 (i.e. CheckPoint)”. Therefore, the RSE can
not calculate the toll fee amount and it has to ask again the RSE as following.
100
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
AP DSRC-L7 DSRC-L7 AP
Step 2:
GET_INSTANCE.rq(EID=1, N1=1,
N2=1, ReceiptServicePart)
GET_INSTANCE.ind()
GET_INSTANCE.rs([ReceiptServicePart])
GET_INSTANCE.cf
N1 and N2 are incremented till the TypeOfStation = EntryType (it is assumed that N1 = 1 in this example)
Step 3:
[Link](EID=1
ReceiptServicePart
ReceiptContract
ReceiptFinancialPart)
[Link]()
[Link](ReturnStatus_ ‘OK’)
[Link]
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
Step 4:
SET_MMI.rq(SetMMlrq=OK, False)
SET_MMI.ind(SetMMIrq, False)
Step 5:
AP DSRC-L7 DSRC-L7 AP
[Link]()
[Link](OK)
[Link]
Step 6:
[Link]()
[Link](FAILED-TOO LOW )
[Link]
[Link](ReturnStatus=OK)
[Link]
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
102
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
Annex D
(informative)
Functional requirements
In the following, the functional requirements, which have been used to validate this International Standard, are
presented. The requirements have been identified by evaluating a number of input papers coming from
different European and non-European operators, describing different transactions profiles and models.
The analyses of the available input papers lead to a list of basic requirements, which have been grouped into
seven different functional areas, specifically:
Transaction Types;
Payment Types;
Contract Types;
Contract Handling;
Security Mechanism;
Operational Issues;
Tariffing Schemes.
Each functional area contains a number of elementary functional requirements. The detail of these elementary
requirements is given by the following tables, which include a brief description of each requirements and
eventually an explanatory example. This list is not exhaustive, and anyway contains only those requirements
which have an impact on the EFC messages exchanged via the DSRC link.
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
Checking Transaction Transaction performed to check the Used to enforce vehicles, by checking
correct execution of the transaction; it is the correct execution of the last
based on a secure reading operation transaction
Centrally held account Transaction based on a simple The transaction and therefore the
(AVI-like) transaction identification of the OBE debiting is based only on the
identification of the code of the unit
Purse Reloading Transaction occurring when the The purse can be loaded by the use
Transaction electronic purse needs to be reloaded of the DSRC link, when it is
implemented directly as a part of the
OBE and therefore it cannot be
accessed in a different way
Service Operations
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
104
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
Electronic Purse Payment based on electronic purse An electronic purse can be used for
Based Payment value transfer the payment of different services
Token Based Payment based on token transfer Tokens can be used only for the
Payment payment of the service for which they
have been issued
Area Dependent The choice of the tariffing scheme to be People living in a certain area can
Contract applied depends on the location where have a discount on the tariff when
the transaction occurs using the toll facility within that area
Time Dependent The choice of the tariffing scheme to be A specific tariff may be applied at
Contract applied depends on the time period certain time slots during the day (e.g.
during which the transaction occurs peak hours for commuters) or at
certain periods during the year (e.g.
holiday period)
Vehicle Dependent The choice of the tariffing scheme to be A specific tariff may be applied
Contract applied depends on the type of vehicle according to the characteristics of
with which the transaction occurs specific vehicles
Person Dependent The choice of the tariffing scheme to be A specific tariff can be agreed
Contract applied depends on the agreement between an operator and a specific
between the operator and a single user with some specific needs.
person
Group of Persons The choice of the tariffing scheme to be A specific tariff can be agreed
Dependent Contract applied depends on the agreement between an operator and a group of
between the operator and a group of persons with common characteristics,
persons for example the employee of the toll
company
Contract Selection A negotiation between roadside and on- An OBE can support different
board equipment should lead to the contracts, agreed with different
selection of a specific contract to be operators; only part of them can be
applied among the possible various active at a certain time; the roadside
supported equipment, taking note of them,
decides which one to apply
Implicit Contract The agreement between operators and Tariff level can be decided at national
customers are not explicitly declared, level, and cannot be modified for any
but they are implicit in the application reason
Multiple Simultaneous Multiple contracts can be used at the Multiple transactions can be
Contracts same time performed at a certain toll facility,
applying to multiple different contracts
106
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
One Way One of the parties involved in the The on-board equipment recognises
Authentication transaction authenticates the other the rights of the roadside unit to
before allowing the transaction perform transactions, or vice versa
Data Integrity Mechanism to guarantee the integrity The integrity of some data elements is
Mechanism (non-alteration) of data elements guaranteed by verifying a digital
signature, calculated starting from the
right value of the data element
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
Time/Event Based Security based on the tracking of the A transaction is allowed if no time
Mechanism time and of the occurrence of certain mismatching is verified or if some
events specific events are occurred
Different gantries Number of gantries composing the toll Single gantry or Multiple gantry
configurations gate, and therefore involved in a single configurations of the toll gate
transaction
Different lane Architecture of each gantry in terms of Single lane, multilane or pseudo-
configurations number of lanes multilane configuration
OBE components Possibility of addressing and therefore Display, Smart Card, MMI Interface
addressing communicating directly with a specific
OBE component
Declared The class of the vehicle used for the It can be always the case when some
classification price calculation is stored within the not measurable parameters are used
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
OBE
OBE Capability Mechanism for getting information and Presence of a Display, Characteristics
Handling Mechanism therefore handling the different of the Display, Presence of a Smart
functions supported by the OBE Card
108
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
Distance Dependent Tariffing scheme based upon the travel Closed toll system
distance
Time Dependent Tariffing scheme based on the time Elapsed time for parking
Event Dependent Tariffing scheme based on the The tariff changes after a certain
occurrence of events number of entry in one day
Fixed Tariffing scheme fixed, not dependent The same tariff is applied to any
by a specific parameter vehicle
Combined Scheme Combined tariffing scheme Tariff calculated upon the travel
distance and the class of the vehicle
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
Annex E
(normative)
If a Service Provider wants to use LatinAlphabetNo1 to encode an OBE, Table E.1 shall be used to map non-
Latin1 characters to lower case Latin1 characters.
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
ISO 8859-5 Ƀ-ɣ j
ISO 8859-5 Ʌ-ɥ l
ISO 8859-5 ɉ-ɩ p
ISO 8859-5 ɍ-ɭ y
ISO 8859-5 Ɏ-ɮ o
ISO 8859-5 ɐ-ɰ u
ISO 8859-5 ɑ-ɱ i
ISO 8859-5 ɒ-ɲ w
ISO 8859-5 ɓ-ɳ m
ISO 8859-5 ɔ-ɴ b
ISO 8859-5 ɕ-ɵ q
ISO 8859-5 ɖ-ɶ h
ISO 8859-5 ɗ-ɷ f
ISO 8859-5 ɘ-ɸ t
ISO 8859-5 ə-ɹ r
110
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
Annex F
(informative)
To ease the task of a service provider when he needs to personalise an OBE by obtaining vehicle data, the
following table provides a correspondence between elements available inside the registration certificate and
the data element that could use this information (coding according to ISO 14906).
The registration certificate is defined by the European Directive 1999/37 and successive
amendment 2003/127.
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
112
Copyright International Organization for Standardization © ISO 2011 – All rights reserved
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST
ISO 14906:2011(E)
Bibliography
[1] ISO/IEC 7498-1:1994, Information technology — Open Systems Interconnection — Basic Reference
Model: The Basic Model
[2] ISO 7498-2:1989, Information processing systems — Open Systems Interconnection — Basic
Reference Model — Part 2: Security Architecture
[3] ISO 17573, Electronic fee collection — Systems architecture for vehicle-related tolling
[4] ISO/TS 17574, Electronic fee collection — Guidelines for security protection profiles
[5] ISO/TS 12813:2009, Electronic fee collection — Compliance check communication for autonomous
system
[6] ISO/TS 25110, Electronic fee collection — Interface definition for on-board account using integrated
circuit card (ICC)
--`,```,``,,```,``,`,```,``,``,,-`-`,,`,,`,`,,`---
Copyright International©Organization
ISO 2011 – All rights reserved
for Standardization
Provided by IHS under license with ISO Licensee=University of Alberta/5966844001, User=sharabiani, shahramfs
No reproduction or networking permitted without license from IHS Not for Resale, 12/06/2013 [Link] MST