{"id":231589,"date":"2024-10-19T15:05:10","date_gmt":"2024-10-19T15:05:10","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-149062018\/"},"modified":"2024-10-25T09:25:22","modified_gmt":"2024-10-25T09:25:22","slug":"bs-en-iso-149062018","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-149062018\/","title":{"rendered":"BS EN ISO 14906:2018"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | European foreword Endorsement notice <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 1 Scope <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5 EFC application interface architecture 5.1 Relation to the DSRC communication architecture <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.2 Usage of DSRC application layer by the EFC application interface 5.3 Addressing of EFC attributes 5.3.1 Basic mechanism <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.3.2 Role of the EID 5.3.3 Multiple Instances of Attributes <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.4 Addressing of components <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 6 EFC Transaction Model 6.1 General 6.2 Initialisation Phase 6.2.1 Overview <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.2.2 EFC application-specific contents of the BST <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.2.3 EFC application-specific contents of the VST <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.3 Transaction phase <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 7 EFC functions 7.1 Overview and general concepts 7.1.1 EFC functions and service primitives <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 7.1.2 Overview of EFC functions <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 7.1.3 Handling of multiple instances <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 7.1.4 Security <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 7.2 EFC functions 7.2.1 General 7.2.2 GET_STAMPED <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 7.2.3 SET_STAMPED <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 7.2.4 GET_SECURE <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 7.2.5 SET_SECURE <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 7.2.6 GET_INSTANCE 7.2.7 SET_INSTANCE <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 7.2.8 GET_NONCE <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 7.2.9 SET_NONCE 7.2.10 TRANSFER_CHANNEL <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 7.2.11 COPY <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 7.2.12 SET_MMI 7.2.13 SUBTRACT <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 7.2.14 ADD 7.2.15 DEBIT <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 7.2.16 CREDIT <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 7.2.17 ECHO <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 8 EFC Attributes 8.1 General <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 8.2 Data group CONTRACT <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 8.3 Data group RECEIPT <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 8.4 Data group VEHICLE <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | 8.5 Data group EQUIPMENT <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 8.6 Data group DRIVER <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 8.7 Data group PAYMENT <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | Annex A (normative) EFC data type specifications <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | Annex B (informative) CARDME transaction <\/td>\n<\/tr>\n | ||||||
102<\/td>\n | Annex C (informative) Examples of EFC transaction types <\/td>\n<\/tr>\n | ||||||
114<\/td>\n | Annex D (normative) Mapping table from LatinAlphabetNo2 & 5 to LatinAlphabetNo1 <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | Annex E (informative) Mapping table between EFC Vehicledata attribute and European registration certificate <\/td>\n<\/tr>\n | ||||||
118<\/td>\n | Annex F (normative) Security calculations for DES <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | Annex G (informative) Security computation examples for DES <\/td>\n<\/tr>\n | ||||||
126<\/td>\n | Annex H (normative) Security calculations for AES <\/td>\n<\/tr>\n | ||||||
131<\/td>\n | Annex I (informative) Security computation examples for AES <\/td>\n<\/tr>\n | ||||||
133<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Electronic fee collection. Application interface definition for dedicated short-range communication<\/b><\/p>\n |