Version 1: Release Note 28 November 2014


Common Message Processing steps - informative



Download 4.8 Mb.
Page35/258
Date03.04.2021
Size4.8 Mb.
1   ...   31   32   33   34   35   36   37   38   ...   258

Common Message Processing steps - informative


A common set of stages for Remote Party Message processing is used in this GBCS and the Use Cases, except for Variant Messages15. Variant Messages include Security Credentials and Prepayment Top Up related Messages.

The common set of stages for Commands is shown in Table 5.4a.



Name of Stage

Summary of the stage

Responsible Smart Metering Entity

  1. Command Construction

The Command is fully populated, apart from cryptographic fields

N/A

The entity undertaking this phase is not known to the Device

Although not apparent to the Device, the DSP’s Transform Service would normally undertake such construction for DCC managed Devices


  1. Command Cryptographic Protection I

This stage is only needed where a Remote Party, other than the Access Control Broker, is required to add Cryptographic Protection to the Command. So for digital signing of Critical Commands only

Known Remote Party

  1. Command Cryptographic Protection II

The Access Control Broker adds its Cryptographic Protection to the Message. This is by way of the ACB adding a MAC

Access Control Broker

  1. Command Authenticity and Integrity Verification

The Device undertakes the range of checks needed, including those to ensure authenticity of the sender and integrity of the Message.

This includes checking the Identifiers and Counter in the Command and verifying the Access Control Broker’s MAC



Device

Table 5.4a: Common stages for Commands

That common set of stages for Responses is shown in Table 5.4b.



Name of Stage


Directory: government -> uploads -> system -> uploads -> attachment data -> file
file -> Remove this if sending to pagerunnerr Page Title Light Rail Security Recommended Best Practice
file -> 8 Section 1 : Sport
file -> Notice of exercise of additional powers of seizure under Sections 50 or 51 of the Criminal Justice and Police Act 2001
file -> Home office circular 004/2014 Powers to search for and seize invalid travel documents in Schedule 8 to the Anti-social Behaviour, Crime and Policing Act 2014
file -> Consultation on the Royal Parks and Other Open Spaces (Amendment) (No. 2) Regulations 2012
file -> Crown copyright 2012
file -> This is the Report to Government by the Film Policy Review Panel The brief
file -> Impact Assessment (IA)
file -> Dcms/Wolfson Museums and Galleries Improvement Fund a public-Private Partnership (2002-2010)


Share with your friends:
1   ...   31   32   33   34   35   36   37   38   ...   258




The database is protected by copyright ©essaydocs.org 2020
send message

    Main page