Results for area 9.7 Data
label, symbol or token that names or identifies an entity or a collection of data or the means of designating or referring to a specific instance of a data concept
prescribed list of reference identifiers which relate to prescribed coding schemes determined in this International Standard and/or issued by the authorized numbering scheme administrator
identification as a stand alone identity that does not require any qualifiers such as an expiration date, etc.
NOTE 1 to entry: All construct identifiers will be built from more than one primitive identifier.
data value in the on-board unit that is incremented by the ERI Reader/Writer at each ERI session
number assigned to and written into an ERT that acts as an ERT unique identifier
NOTE The ERT number is assumed to be written into the ERT during its manufacture and once written cannot be changed.
information which unambiguously distinguishes an entity
ERI data in addition to the vehicle identifier
vehicle identifying data which can be obtained from an ERT
NOTE ERI data consists of the vehicle identifier and possible additional vehicle data.
identification which requires a construct of more than one primitive identifier, as defined in ASN.1
time variant parameter whose value is unpredictable
refers to class 1 requirements for the “ruggedized” system category “A”
sequence of symbols that controls the operations of a cryptographic transformation (e.g. encipherment, decipherment, cryptographic check function computation, signature generation, or signature verification)
confidential authentication information, usually composed of a string of characters
private key which defines the private decipherment transformation
key of an entity's asymmetric key pair which should only be used by that entity
NOTE In the case of an asymmetric signature system the private key defines the signature transformation. In the case of an asymmetric encipherment system the private key defines the decipherment transformation.
private key which defines the private signature transformation
public key which defines the public encipherment transformation
key of an entity's asymmetric key pair which can be made public
NOTE In the case of an asymmetric signature system the public key defines the verification transformation. In the case of an asymmetric encipherment system the public key defines the encipherment transformation. A key that is “publicly” known is not necessarily globally available. The key is only made available to all members of a pre-specified group.
certificate public key information of an entity signed by the certification authority and therefore rendered unforgeable
NOTE A public key certificate also specifies the role of the entity for which the public key information is provided, e.g. manufacturer or registration authority.
public key which defines the public verification transformation
key that is used with a symmetric cryptographic algorithm
NOTE 1 Possession of a secret key is restricted (usually to two entities).
NOTE 2 For ERI, there can be only one entity or several entities, depending on the key management policy.
access key for a system operator
data item chosen at random and sent by the verifier to the claimant, which is used by the claimant, in conjunction with secret information held by the claimant, to generate a response which is sent to the verifier
EXAMPLE In ISO 24534-4 the term challenge is also used in case an ERT does not have enabled encryption capabilities and the challenge is merely copied without any secret information applied.
string of bits which is the output of a hash-function
framework comprising a number of data elements in a prescribed form
NOTE Also known as a “message”.