• There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

UNI EN ISO 24534-4 : 2011

Superseded
Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by
superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES
Superseded date

29-05-2019

Published date

01-01-2011

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviations
5 System communications concept
6 Interface requirements
Annex A (normative) - ASN.1 modules
Annex B (normative) - PICS pro forma
Annex C (informative) - Operational scenarios
Bibliography

Offers requirements for electronic registration identification (ERI) that are based on an identifier assigned to a vehicle (e.g. for recognition by national authorities).

CommentClosesDate
23-05-2019
DevelopmentNote
Supersedes UNI CEN ISO/TS 24534-4. (02/2011)
DocumentType
Standard
PublisherName
Ente Nazionale Italiano di Unificazione (UNI)
Status
Superseded
SupersededBy
Supersedes

Standards Relationship
EN ISO 24534-4:2010 Identical
ISO 24534-4:2010 Identical

ISO/IEC 9798-3:1998 Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques
ISO/IEC 7498-1:1994 Information technology Open Systems Interconnection Basic Reference Model: The Basic Model
ISO/IEC 8825-2:2015 Information technology ASN.1 encoding rules: Specification of Packed Encoding Rules (PER) Part 2:
ISO/IEC 10646:2014 Information technology Universal Coded Character Set (UCS)
ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
ISO 14816:2005 Road transport and traffic telematics — Automatic vehicle and equipment identification — Numbering and data structure
ISO 24534-3:2016 Intelligent transport systems — Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 3: Vehicle data
ISO 14906:2011 Electronic fee collection Application interface definition for dedicated short-range communication
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO 15628:2013 Intelligent transport systems — Dedicated short range communication (DSRC) — DSRC application layer
ISO/IEC 7816-4:2013 Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange
ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
ISO/IEC 12207:2008 Systems and software engineering Software life cycle processes
ISO/IEC 7816-3:2006 Identification cards — Integrated circuit cards — Part 3: Cards with contacts — Electrical interface and transmission protocols
ISO/IEC 10181-2:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework
EN 12834:2003 Road transport and traffic telematics - Dedicated Short Range Communication (DSRC) - DSRC application layer
ISO 3779:2009 Road vehicles — Vehicle identification number (VIN) — Content and structure
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO 14815:2005 Road transport and traffic telematics — Automatic vehicle and equipment identification — System specifications
ISO 14814:2006 Road transport and traffic telematics — Automatic vehicle and equipment identification — Reference architecture and terminology
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General

View more information
Sorry this product is not available in your region.

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.