Version 1: Release Note 28 November 2014


Managing Security Credentials on Devices 144



Download 4.8 Mb.
Page7/258
Date03.04.2021
Size4.8 Mb.
1   2   3   4   5   6   7   8   9   10   ...   258
13Managing Security Credentials on Devices 144

13.1Introduction - informative 144

13.2CS02a Provide Security Credential Details Command and Response 146

13.3CS02b Update Security Credentials Command, Response and Alert 158

13.4CS02c Issue Security Credentials 192

13.5CS02d Update Device Certificates on Device 197

13.6CS02e Provide Device Certificates from Device 203

13.7Pair-wise Authorisation of Devices 208

13.8GCS59 / 62 GPF Device Log Backup and Restore 224

14Apply Prepayment Top Up to an ESME or GSME 230

14.1Defined Terms 230

14.2Description - informative 230

14.3Common Requirements 231

14.4CS01a Applying a Prepayment Top Up to an ESME without consumer intervention 233

14.5CS01b Applying a Prepayment Top Up to a GSME without consumer intervention 235

14.6Applying a Prepayment Top Up to an ESME or GSME with consumer entry of a numeric code on the ESME or GSME 236

14.7Applying a Prepayment Top Up to an ESME or GSME with consumer entry of a numeric code on a PPMID 239

14.8Calculating and Verifying the UTRN Check Digit 240

15Message Codes 243

16Event / Alert Codes and related requirements 244

16.1Introduction – informative 244

16.2Event and Alert Codes 245

16.3Event Logs 245

16.4Requirements 245

17Remote Party Usage Rights 247

17.1Remote Party Access Rights to Attributes and Methods 247

17.2Remote Party Usage Rights to Use Cases 247

18Message Templates 248

18.1GBZ and ZSE Message Templates 248

18.2DLMS COSEM Message Templates 251

18.3Illustrative command and response instantiation and DER encoding 264

18.4Cryptographic Test Vectors 269

19Use Cases 281

19.1Use Case Title 281

19.2Use Case-specific content 282

19.3Embedded Use Cases 284



20Mapping Table 285

21Glossary 286

22Annex 1 – Additional DLMS Class 300

22.1Attribute description 300

22.2Method description 302

23Annex 2 - Counters and their use in transaction identification and Protection Against Replay protection - informative 303

24Annex 3 – ASN.1 modules - informative 307

25Annex 4 - Use of ZigBee in GBCS - informative 328

25.1Purpose 328

25.2GBCS requirements to use ZigBee 328

25.3GBCS requirements not to use ZigBee / vary from it 328



26Annex 5 - Use of DLMS COSEM in GBCS - informative 329

26.1Purpose 329

26.2GBCS requirements to use DLMS COSEM 329

26.3GBCS requirements not to use DLMS COSEM / vary from it 330



27Annex 6 - Deducing the UTRN Counter from the Truncated UTRN Counter – informative 331

  1. Directory: government -> uploads -> system -> uploads -> attachment data -> file
    file -> Remove this if sending to pagerunnerr Page Title Light Rail Security Recommended Best Practice
    file -> 8 Section 1 : Sport
    file -> Notice of exercise of additional powers of seizure under Sections 50 or 51 of the Criminal Justice and Police Act 2001
    file -> Home office circular 004/2014 Powers to search for and seize invalid travel documents in Schedule 8 to the Anti-social Behaviour, Crime and Policing Act 2014
    file -> Consultation on the Royal Parks and Other Open Spaces (Amendment) (No. 2) Regulations 2012
    file -> Crown copyright 2012
    file -> This is the Report to Government by the Film Policy Review Panel The brief
    file -> Impact Assessment (IA)
    file -> Dcms/Wolfson Museums and Galleries Improvement Fund a public-Private Partnership (2002-2010)


    Share with your friends:
1   2   3   4   5   6   7   8   9   10   ...   258




The database is protected by copyright ©essaydocs.org 2020
send message

    Main page