hash stringlengths 32 32 | doc_id stringlengths 7 13 | section stringlengths 3 121 | content stringlengths 0 2.2M |
|---|---|---|---|
0558300fed6e8df498d6967774046a9c | 102 021-7 | 3 Definitions and abbreviations | |
0558300fed6e8df498d6967774046a9c | 102 021-7 | 3.1 Definitions | For the purposes of the present document, the following terms and definitions apply: TETRA Release 2: Work Programme with new terms of reference within ETSI Project TETRA to enhance the services and facilities of TETRA in order to meet new user requirements, utilize new technology and increase the longevity of TETRA wi... |
0558300fed6e8df498d6967774046a9c | 102 021-7 | 3.2 Abbreviations | For the purposes of the present document the following abbreviations apply: GCK-N Group Cipher Key Number GCK-VN Group Cipher Key Version Number HSD High Speed Data ITSI Individual TETRA Subscriber Identity K authentication Key ME Mobile Equipment OTAK Over The Air Keying OTAR Over The Air Re-keying PAMR Public Access ... |
0558300fed6e8df498d6967774046a9c | 102 021-7 | 4 User Requirement Specification | |
0558300fed6e8df498d6967774046a9c | 102 021-7 | 4.1 User Requirements from questionnaire | Due to the specialist nature of security requirements and also due in some part to the sensitivity of users to discuss in open forum threats to any current standard, it was not considered appropriate to collect security requirements as part of the wider TETRA Release 2 user questionnaire sent out in 2001. |
0558300fed6e8df498d6967774046a9c | 102 021-7 | 4.2 User Requirements derived from work on TETRA Release 1 | TETRA Release 1, TETRA Release 2, and TETRA Release 2.1 should be maintained at an equal level of security. If further enhancements to the security of TETRA Release 2.1 are required, they should be applicable to all TETRA Releases up to Release 2.1. This is considered fundamental to Public Safety users as current and f... |
0558300fed6e8df498d6967774046a9c | 102 021-7 | 4.3 Core requirements | Although system requirements should be derived from the new threat analysis, it is considered probable that as a minimum the following core requirements will need to be supported by TETRA Release 2.1: 1) The TETRA Release 2.1 security standard should be able to provide authentication of the terminal and the infrastruct... |
0558300fed6e8df498d6967774046a9c | 102 021-7 | 4.4 Work required | It is considered appropriate that a revised threat analysis is produced to encompass any new services and facilities that become available through TETRA Release 2.1. WG6 should also work with other WGs to ensure that the security requirements are passed through to any new standards that are produced. |
0558300fed6e8df498d6967774046a9c | 102 021-7 | 4.5 Testing requirements | The new security requirements should be traceable to a new threat analysis. |
0558300fed6e8df498d6967774046a9c | 102 021-7 | 4.6 Timescales | Security standardization should be completed in line with other developments such as Air Interface Enhancements, HSD, Smart Card/SIM, Local Mode Broadband, and Over The Air Management. This should ensure that any users wishing to migrate their systems from TETRA 1 to Release 2.1 are not being subject to any increased t... |
1551d326c729f60132004a7fb63305d3 | 102 031-2 | 1 Scope | The present document examines the electrical and mechanical characteristics required for circularly polarized antennas, and the related conformance testing. The requirements for linearly polarized antennas are covered by EN 301 525 [5] and EN 302 085 [6]. Electronically steerable antennas, and linearly polarized antenn... |
1551d326c729f60132004a7fb63305d3 | 102 031-2 | 2 References | For the purposes of this Technical Report (TR), the following references apply: [1] Evans, G.E.: "Antenna Measurement Techniques", Artech House 1990". [2] Hollis, J.S., Lyon, T.J., Clayton, L.: "Microwave Antenna Measurements", Scientific-Atlanta Inc., 1970". [3] Hollis, J.S., Clayton, L.: "Antenna Polarization Analysi... |
1551d326c729f60132004a7fb63305d3 | 102 031-2 | 3 Definitions, symbols and abbreviations | |
1551d326c729f60132004a7fb63305d3 | 102 031-2 | 3.1 Definitions | For the purposes of the present document, the following terms and definitions apply: antenna: part of the transmitting or receiving system that is designed to radiate or receive electromagnetic waves axial ratio: ratio of maximum to minimum power contained in the field components of the polarization ellipse radiation p... |
1551d326c729f60132004a7fb63305d3 | 102 031-2 | 3.2 Symbols | For the purposes of the present document, the following symbols apply: dB DeciBels GHz GigaHertz τ tilt angle ETSI ETSI TR 102 031-2 V1.1.1 (2002-01) 6 |
1551d326c729f60132004a7fb63305d3 | 102 031-2 | 3.3 Abbreviations | For the purposes of the present document, the following abbreviations apply: AR Axial Ratio CP Circularly Polarized CPR Circular Polarization Ratio CS Central Station MP MultiPoint RHCP Right Hand Circular Polarization LHCP Left Hand Circular Polarization RPE Radiation Pattern Envelope XPD cross Polar Discrimination |
1551d326c729f60132004a7fb63305d3 | 102 031-2 | 4 Circular polarization testing | Consider an elliptical polarized electromagnetic plane wave. The tip of the rotating vector E(t) traces out an ellipse. Figure 1: Polarization ellipse The polarization ellipse in figure 1 is characterized by three parameters described as follows: a) the axial ratio AR is defined by the ratio of maximum length and minim... |
1551d326c729f60132004a7fb63305d3 | 102 031-2 | 5 Polarization conversion | Table 1 below lists the relationships between the axial ratio AR and the crosspolar discrimination XPD. Table 1: Cross Polar discrimination as a function of Axial Ratio AR AR [dB] XPD [dB] AR AR [dB] XPD [dB] 1,01 0,09 46,06 1,80 5,11 10,88 1,02 0,17 40,09 1,90 5,58 10,16 1,03 0,26 36,61 2,00 6,02 9,54 1,04 0,34 34,15 ... |
1551d326c729f60132004a7fb63305d3 | 102 031-2 | 6 Pattern Measurement | For circular polarization testing four methods can be used as illustrated in figure 4 [1]. The reference antenna must be either rotatable linear or circular with very small axial ratio: a) measure phase and amplitude of two linear components; b) measure amplitude of three or four linear components [3]; c) rotating line... |
1551d326c729f60132004a7fb63305d3 | 102 031-2 | 7 Examples and comparison of measurement methods | |
1551d326c729f60132004a7fb63305d3 | 102 031-2 | 7.1 Comparison of circular vs multiple linear components | Radiation pattern of a circular polarized satellite antenna feed horn measured by using a circular polarized reference antenna with very small axial ratio. The reference antenna is rotated to show the minimum and maximum of cross-polar level. Figure 5: Radiation pattern of a CP antenna Pattern cuts at 10, 70, 130, 210 ... |
1551d326c729f60132004a7fb63305d3 | 102 031-2 | 7.2 Rotating linear polarized reference antenna | This method does not yield either tilt angle or sense of polarization. The axial ratio over an entire pattern cut can be accomplished by rotating the tilt angle of a linearly polarized transmit antenna while a pattern cut of the antenna under test is being recorded. The rate of rotation of the transmit antenna must be ... |
1551d326c729f60132004a7fb63305d3 | 102 031-2 | 9 Radiation Pattern Envelope (RPE) | |
1551d326c729f60132004a7fb63305d3 | 102 031-2 | 9.1 Objective | To verify that the antenna radiation pattern, for the declared class and frequency range, is contained within the limits of the stated RPE from the relevant standard. This covers both azimuth and elevation, as applicable. ETSI ETSI TR 102 031-2 V1.1.1 (2002-01) 18 |
1551d326c729f60132004a7fb63305d3 | 102 031-2 | 9.2 Test instruments and set-up | Figure 15 shows a typical test set-up. Transmitting antenna RF - transmitter Microwav Receiver Receiver Transmitter Antenna Axis IUT Figure 15: Example of arrangement for the measurement of the radiation pattern |
1551d326c729f60132004a7fb63305d3 | 102 031-2 | 9.3 Test procedure | The test methods described in IEC 835-2-2 [7] are generally applicable. The antenna shall be measured as a minimum at the lowest, middle and highest of the declared frequency band. The cross-polar radiation patterns shall be recorded after an alignment procedure based on the minimization of the cross-polar level in the... |
1551d326c729f60132004a7fb63305d3 | 102 031-2 | 10 Antenna gain | |
1551d326c729f60132004a7fb63305d3 | 102 031-2 | 10.1 Objective | To verify that the measured gain, for the declared class, category gain and frequency range, satisfies the minimum gain stated in the relevant standard and to use the measured gain to normalize the RPE. |
1551d326c729f60132004a7fb63305d3 | 102 031-2 | 10.2 Test instruments and set-up | Figures 16 to 19 show typical examples of gain measurement test set-ups; in these examples the antenna is taken as having a coaxial or waveguide port respectively. Receiver Transmitter RF- transmitter IUT Gain reference antenna Transmitting antenna Antenna Axis Power Meter/ Receiver Coaxial/ Waveguide Transition Coaxia... |
1551d326c729f60132004a7fb63305d3 | 102 031-2 | 10.3 Test procedure (alternative test procedures could be used) | The test methods described in IEC 835-2-2 [7] are generally applicable. The antenna gain shall be measured as a minimum at the lowest, middle and highest of the declared frequency band. For nominally circularly polarized antennas, the method of partial gains may conveniently be used to determine the circularly polarize... |
5ce10d825fc675951043e3169e5c75c4 | 102 031-1 | 1 Scope | The present document examines the systems aspects of using circular polarization in environments where linear polarization is traditionally used. The requirements for linearly polarised antennas are covered by EN 301 525 [5] and EN 302 085 [6]. Electronically steerable antennas, and linearly polarized antennas are not ... |
5ce10d825fc675951043e3169e5c75c4 | 102 031-1 | 2 References | The following documents contain provisions which, through reference in this text, constitute provisions of the present document. • References are either specific (identified by date of publication and/or edition number or version number) or non-specific. • For a specific reference, subsequent revisions do not apply. • ... |
5ce10d825fc675951043e3169e5c75c4 | 102 031-1 | 3 Abbreviations | For the purposes of the present document, the following abbreviations apply: ATPC Automatic Transmit Power Control CDMA Code Division Multiple Access C/I Carrier to Interference CP Circular Polarization CS Central Station DRS Data Relay Satellite DSSS Direct Sequence Spread Spectrum EIRP Effective Isotropic Radiated Po... |
5ce10d825fc675951043e3169e5c75c4 | 102 031-1 | 4 The multipath problem | Here the multipath problem is explained with wideband transmission as an example. However, similar considerations apply to MP systems employing other access technologies. Consider an isolated MP system using wideband transmission technology. Let the system be capable of supporting N users simultaneously. Assume that or... |
5ce10d825fc675951043e3169e5c75c4 | 102 031-1 | 5 Circular polarization (CP) | CP can be considered as a vector sum of two linearly polarized components of equal amplitude but with a constant 90 degrees phase shift between them. At any fixed point along the direction of propagation, the electric field traces a circle. The wave is left hand CP or right hand CP depending on the direction of rotatio... |
5ce10d825fc675951043e3169e5c75c4 | 102 031-1 | 6 Considerations in the use of CP | Traditionally, fixed link radio systems employ linear polarization (either vertical or horizontal). CP is used in satellite systems where the difficulty of antenna pointing is alleviated. It is also used for outside broadcast fixed links and outdoor mobile platforms. CP is commonly used for indoor wireless Local Area N... |
5ce10d825fc675951043e3169e5c75c4 | 102 031-1 | 6.1 Advantages of using circular polarization | Circular polarization gives better discrimination than plane polarization against the reception of multipath propagated signals. Linear polarization is good for ground bounces whereas horizontal polarization is good for reflections off vertical surfaces. However, where random reflections from random surfaces (e.g. roof... |
5ce10d825fc675951043e3169e5c75c4 | 102 031-1 | 6.2 Disadvantages of using circular polarization | Some bands defined in 1 GHz to 3 GHz and 3 GHz to 11 GHz have high percentage bandwidths and maintenance of cross-polar performance over a wide bandwidth is difficult for circularly polarized designs. It is notoriously difficult to achieve low axial ratio and hence low cross-polar over wide angles of coverage, and this... |
5ce10d825fc675951043e3169e5c75c4 | 102 031-1 | 7 CP and LP antenna cost comparisons | Terminal station antennas in this frequency band tend to be in planar printed circuit form. Patch antennas for both LP and CP can be produced with the same technology and hence there is unlikely to be a significant difference in costs and sizes of CP and LP antennas. |
5ce10d825fc675951043e3169e5c75c4 | 102 031-1 | 8 Impact of using CP on other systems | Where CP is used in networks, the following interference scenarios are considered in some detail: • use of CP systems in a band flanked on either side by linear polarized systems; • interference into satellite systems; • co-channel interference into systems sharing the same band but using linear and circular polarizati... |
5ce10d825fc675951043e3169e5c75c4 | 102 031-1 | 8.2 Interference into satellite systems | Where a terrestrial band is shared with satellite paths, as shown in figure 3, it is essential to verify that the impact of using CP instead of linear polarization is not detrimental to other systems. For example, ITU-R Recommendation F.1247-1 [2] shows that in the band 2 200 MHz to 2 290 MHz, the effective isotropic r... |
5ce10d825fc675951043e3169e5c75c4 | 102 031-1 | 8.3 Co-channel interference in MP systems | In MP systems the up-link interference is generally more serious than down-link interference. Three simplified interference scenarios are shown in figure 4. Figure 4a shows two cells with omni-directional antennas and using the same frequency. Both central stations are assumed to use Linear Polarization (LP). A termina... |
5ce10d825fc675951043e3169e5c75c4 | 102 031-1 | 9 Conclusions | The use of CP in urban/suburban MP systems gives an additional degree of freedom in optimizing system performance by reducing the effect of multipath in up-links. This is a particular benefit in heavily urban environments where reflections tend to be from approximately perfect conductors. If the multipath suppression a... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 1 Scope | The present document defines minimum requirements for the provision of harmonized status information on certification-service-providers and other Trust Service Providers (TSPs) and for the means to provide such information. The requirements can be used as the starting point for the development of technical norms and ag... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 1.1 Intended audience | The present document is intended to be of interest to at least the following audiences: Those having responsibility for the specification, management or operation of schemes which oversee the trust services provided by TSPs and those who may have a role in the drafting and passing of legislation governing the provision... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 1.2 Status of the requirements herein | The present document is an ETSI Technical Report. It conveys informative material which has been prepared by a team of experts who have drawn input from a wide range of sources concerned with specification, management, operation or legislation in connection with schemes which provide status information about trust serv... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 1.3 Notice to readership | It is important that the readership of the present document is fully aware of the fact that it is not the intention of the present document to impose upon any form of, or specific, approval scheme the freedom to operate in a manner of its own choosing. Adoption of these harmonized requirements is entirely voluntary and... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 2 References | For the purposes of this Technical Report (TR) the following references apply: [1] PKI Forum Technology Working Group White Paper on CA-CA interoperability (March 2001). [2] Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures. [3] ITU... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 3 Definitions and abbreviations | |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 3.1 Definitions | For the purposes of the present document, the following terms and definitions apply: approval: assertion that a(n electronic trust) service, falling within the oversight of a particular scheme, has been either positively endorsed (active approval) or has received no explicit restriction since the time at which the sche... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 3.2 Abbreviations | For the purposes of the present document, the following abbreviations apply: CA Certification Authority CPS Certification Practice Statement CRL Certificate Revocation List CSP Certification Service Provider CWA CEN Workshop Agreement EC European Commission EEA European Economic Area EESSI European Electronic Signature... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 4 Objectives and methods of investigation | This clause describes the objectives for the task set by the STF178-5 team and the methods used for performing the investigation. It refers to the briefing document and questionnaire prepared for interviewing the interested parties (those responsible for supervision systems and voluntary approval schemes, as well as re... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 4.1 Task objectives | In January 2001, the ETSI Electronic Signature and Infrastructure Working Group established a work program supported by a Specialist Task Force (STF 178) as part of the European Electronic Signature Standardization Initiative (EESSI), Phase 3. STF 178 Task 5 was charged with establishing requirements for the provision ... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 4.2 Task rationale | |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 4.2.1 The need for status information | Among the most easily identified situations in which status information is needed, one such case is when a relying party who is in possession of the other party's Public Key Certificate wishes to rely upon that Certificate for the purpose of conducting some form of transaction. Another one is when, subsequent to a tran... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 4.2.2 The need for harmonization | Some schemes have already established procedures and facilities for the provision of status information about TSPs. However, these schemes are not being harmonized and neither are the protocols and formats used for retrieving such information by the relying party. In order for a user's system to do business with actors... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 4.3 Requirements determination process | The STF 178-5 team has, in the first instance, taken input from those individuals responsible for the operation or implementation of approval schemes. The team wished to see how such schemes are working and what kind of information they might either wish to provide or would expect to be provided to relying parties. Of ... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 5 Results of investigation | This clause describes the results of the requirements capture process undertaken to establish the harmonized requirements expressed in clause 6 of the present document. It provides background about the extent of input received by the authors, which provides helpful context for the harmonized requirements. It should be ... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 5.1 Introduction | Input was received from two distinct perspectives: firstly, and primarily, from that of being involved in the operation and management of a "scheme"; secondly from being one who might be a relying party wishing to use such a scheme. Clause 5.2 provides an overview of the countries from which input on schemes has been r... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 5.2 Overview of countries and schemes types | The table in this clause indicates for each country that contributed to the input the kind of scheme(s) that are in operation or for which there are concrete implementation or development plans. The scheme types are classified here as "Regulatory scheme" (e.g. supervision system in EU/EFTA countries in accordance with ... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 5.3 Summary of regulatory scheme types | Although the overall objectives for the present document were to encompass a wider set of schemes than simply those that might fall under the scope of Directive 1999/93/EC [2], the reality is that of the 16 identified regulatory schemes, 15 are established in Europe. Note that these schemes may exist only on paper or m... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 5.3.1 Supervision systems | Of the 16 responding supervision systems in Europe, 10 have been created directly as a result of the mandatory implementation of Directive 1999/93/EC [2]. In 3 other EU countries, electronic signature legislations and the systems for implementing and maintaining electronic signature regulations existed prior to the pub... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 5.3.2 Scope and process of supervision | The scope of supervision by the various systems differs widely. In some countries all TSPs, irrespective of the kind of services offered, fall under the supervision system (AT, DE and ES); in other countries the scope is limited to those TSPs that issue qualified certificates to the public (BE, CH, DK, FI, FR, GB, HU, ... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 5.3.3 Provision of status information | Three countries have implemented systems for providing status information regarding TSPs that fall under the supervision system. The supervision system in Austria issues public key certificates to registered TSPs. The supervision system in Italy provides a signed list containing information on all registered TSPs. The ... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 5.4 Summary of voluntary schemes | Article 3.2 of Directive 1999/93/EC [2] allows Member States to introduce or maintain "voluntary accreditation (approval) schemes" aiming at enhanced levels of TSP service provision. "Voluntary accreditation (approval)" is defined in the Directive as "any permission, setting out rights and obligations to the provision ... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 5.4.1 Public and private body schemes | The definition of "voluntary accreditation (approval)" in the Directive refers to "public or private" bodies that could be charged with conformity assessment of TSPs in a voluntary scheme. The responses received indicate that 2 countries (AT, DE) have, on the basis of regulations adopted before Directive 1999/93/EC [2]... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 5.4.2 Scope of voluntary schemes | Voluntary schemes may be operated by either national administrations or by private/industry bodies. In the first case, the same national bodies that are responsible for the regulatory schemes may operate the public body voluntary schemes identified in the table in clause 5.2 above. However, the actual assessment activi... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 5.4.3 Provision of status information | The input received indicates that the public body voluntary schemes have decided on provision of status information: the schemes in Austria and Germany issue public key certificates to accredited TSPs. Within European private voluntary schemes, the ideas of tScheme in the UK can be called well established indeed, with ... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 5.5 Technical issues | None of the responses indicates that technical issues have been considered so far. In interviews, the scheme operators expressed generally that standard web-based tools should be doing the job. Most scheme operators foresee that textual information, i.e. information to be read and interpreted by relying parties, would ... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 5.6 Relying party issues | In formulating the questionnaire, and in keeping with the scope of the task, the focus has been on scheme operators as the sources that should provide status information on TSPs. The relying parties were included in the questionnaire at a late stage, as a potential source of "added value" information. It proved difficu... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 6 A trust model and the need for status information | This clause defines a Trust Model for the open environment (in clause 6.1) and explains the various verification processes that go on within it. Various existing options for trust domain interoperability are then discussed, addressing their suitability in regard to fulfilling the requirements for providing TSP status i... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 6.1 Introduction | The focus of the present investigation is on trust services, made available to the public at large in an open, non-discriminatory manner. These principles apply to both service providers and users, and the term "open environment" is used in this sense. Although much of the analysis is based on existing knowledge and pr... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 6.2 Trust model in the open environment | It will be easier for users to compare and accept service providers and their products, e.g. certificates, if the service is governed by: • A widely agreed and published set of requirements for the service; • Harmonized approval criteria applied by evaluators/auditors; • Harmonized means for providing information about... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 6.2.1 Verification of service identity and policy | This is indicated in the verification of information path "1" in figure 1. The certificate provides information about the identity of the key pair holder. It also provides, by an OID or by a statement, a reference to the policy under which the certificate was issued. Thus, the relying party can make a judgement as to w... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 6.2.2 Verification of certificate status | This is indicated in the verification of information "2" in figure 1. The relying party may inspect status information that tells them whether or not the certificate remains valid at the time of checking. This stage is well covered by standardized certificate management protocols, formats and encoding in the standards.... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 6.2.3 Verification of approval and current status of the service | This is indicated in the verification of information path "3" in figure 1, and represents the specific added value for which the present document seeks to define requirements. Any TSP that falls under the oversight of a scheme (whether that be by obligation or choice) may have information about its status provided by t... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 6.3 Comparison of different policy mapping concepts | This clause examines different mechanisms for policy mapping, and identifies where they may have any valuable contribution to the issue of the provision of status information. Significant work has been undertaken to examine how different trust domains can inter-operate. To some extent this inter-operation is the issue ... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 6.4 Existing approval scheme mechanisms | The known mechanisms already in use or proposed by existing schemes are described below, with an analysis as to their ability to support the requirements of this task. • Signed List: This approach is used by the Italian supervision system, the list and the issuing authority's public key being widely available from the ... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 6.5 The way forward | On the basis of the foregoing discussion of the requirements for relying party verification of trust, and the available inter-operability mechanisms and their comparison with those requirements, the present document concludes that a form of signed list is the best-suited mechanism by which status information can be pro... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 7 Harmonized requirements for TSP status information | This clause addresses the requirements for harmonized provision of TSP status information. In recognition of the selection of a form of signed list as the basis for presentation of this information, the term "TSP Status List (TSL)" is adopted. Each scheme would maintain its own TSL in as close a fashion to the eventual... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 7.1 Information provision | Within each scheme's TSL, status information should be provided in each of the following forms: • Human readable in hard-copy form; • Human readable in a format readily down-loadable and printable; • Machine readable to allow automatic verification of status information. The manner in which the status information shoul... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 7.2 TSP Status List | As described in clause 6, the objective of the TSP Status List (TSL) is to enhance the confidence of relying parties by providing access to information that allows them to know whether a given Trust Service Provider (TSP) was operating under the approval of that scheme (be it a supervision system, a voluntary approval ... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 7.2.1 TSL general structure | The TSL should be a signed list. The scheme operator issuing the TSL is responsible for signing the list. The manner of signing should be the same as for a CA signing a CRL. The TSL should consist of the following fields: a) Status list to be signed. This field is a sequence containing the identification of the issuing... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 7.2.2 Status list structure | The status list to be signed should be a sequence of fields identifying the version of the list format, the TSL issuer (the scheme), and the date and time the TSL was issued. The status list to be signed should contain the following fields: a) Version identifier of the TSL. This (optional) field describes the version o... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 7.2.3 List of Trust Service Providers | For each TSP the following information should be provided: a) TSP identity, name or other title/reference. This field specifies the name of the legal entity responsible for the TSP services that are or were recognized by the scheme. b) Brand/trading/marketing name under which the TSP operates. This (optional) field spe... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 7.2.4 List of approved services | For each of the TSP's services recognized by the scheme the following information should be provided: a) Identifier of the service. This field contains the identifier of the service type. A list of service types and their identifiers should be defined and agreed (refer to clause 8). b) Service identity, name or other f... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 7.2.5 Service approval history | For each change in TSP service approval status the following information on the previous approval status should be provided in descending order of status change date and time (i.e. the date and time on which the subsequent approval status became effective): a) Identifier of the service. This field contains the identifi... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 7.2.6 Summary of TSL profile | The following is a representation, using informally an ASN.1-like syntax, of the proposed TSL profile (clauses 7.2.1 to 7.2.5 inclusive). It should be noted that this representation is merely a demonstration of the logic of the TSL and not meant as prescription for possible standardization work. Although the preceding ... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 7.3 Performance characteristics | Changes to status information should be provided in a timely fashion according to the following, the response times being dependent upon the format of the information's presentation: a) within two working days of the decision to change status, where the information is made available in hard-copy form; b) within four wo... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 8 Implementation options | This clause deals with possible implementation aspects of the provision of status information in electronic form, through a TSL as defined in clause 7, both for automated access and processing by relying-party clients, and also in human-readable form. The clause starts with an overview of the major stages that make up ... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 8.1 Automated processing | |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 8.1.1 Process overview and interoperability requirements | Each stage contains some necessary interoperability requirements, to be met in an open environment. A basic assumption is that the relying party, specifically its client software, has to be able to validate the TSP in question on-line, without suspending the transaction. The intention with these requirements is to cont... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 8.1.2 Scenarios | The scenarios presented in this clause are examples of possible, and what the authors believe likely, implementation options for the provision of TSP status information. Emphasis is on components for information storage and provision by the scheme and for access and evaluation by relying parties. Both of the presented ... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 8.1.2.1 Scenario based on X.500 Directory | In this scenario the X.500 Directory is used to make the status information available. Most of the interoperability requirements, with the possible exception of some security features, can be met by applying relevant parts of the X.500 specifications. This includes the LDAP protocol for posting and retrieving informati... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 8.1.2.2 Scenario based on Web server | A significant number of questionnaire responses suggested that a Web-based solution may become their preferred means of providing status information. Web technology has reached a high degree of maturity; its main functions and formats are standardized (HTTP, HTML) and it is widely deployed and used. User-friendliness i... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 8.2 Human-readable presentation | The requirement that TSP status information be accessible in human-readable form leads to requirements of varying simplicity and style. The present document describes two alternative ways to provide access - static and dynamic. In either case, human readable form may be entirely natural language or in some mildly encod... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 8.2.1 Static presentation | This would effectively require the provision of the whole of a scheme's status information, i.e. its complete TSL expressed in natural language. This would be a direct report of all fields of the TSL, appropriately structured and presented to allow easy understanding of the information, by service provider, their servi... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 8.2.2 Dynamic presentation | It should not be forgotten that, apart from the obvious and primary needs of parties trying to determine whether they should rely upon a particular certificate's contents, parties seeking status information may be doing so as part of a process of selecting a service provider, and hence their needs should be facilitated... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 8.3 Transition scenario | A further aspect of implementation is how existing schemes might be able to express their status information within the framework of the TSL. As noted previously in the present document, the full scope of the TSL represents the combination of the qualities of the various schemes addressed during the requirements captur... |
37c4ab3864f6673d4ded165887e5f538 | 102 030 | 8.3.1 Basic TSL information | Field Provision Version identifier Readily built-in and maintained. Proposed normative work should specify a particular format governed by a process for maintaining the standard(s). Scheme identity Text of the scheme operator's choosing. Address These will pre-exist in both physical and electronic form. Scheme informat... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.