- Latest available (Revised)
- Original (As adopted by EU)
Commission Implementing Regulation (EU) 2016/799 of 18 March 2016 implementing Regulation (EU) No 165/2014 of the European Parliament and of the Council laying down the requirements for the construction, testing, installation, operation and repair of tachographs and their components (Text with EEA relevance)
When the UK left the EU, legislation.gov.uk published EU legislation that had been published by the EU up to IP completion day (31 December 2020 11.00 p.m.). On legislation.gov.uk, these items of legislation are kept up-to-date with any amendments made by the UK since then.
Legislation.gov.uk publishes the UK version. EUR-Lex publishes the EU version. The EU Exit Web Archive holds a snapshot of EUR-Lex’s version from IP completion day (31 December 2020 11.00 p.m.).
There are currently no known outstanding effects by UK legislation for Commission Implementing Regulation (EU) 2016/799.![]()
Revised legislation carried on this site may not be fully up to date. At the current time any known changes or effects made by subsequent legislation have been applied to the text of the legislation you are viewing by the editorial team. Please see ‘Frequently Asked Questions’ for details regarding the timescales for which new effects are identified and recorded on this site.
THE EUROPEAN COMMISSION,
Having regard to the Treaty on the Functioning of the European Union,
Having regard to Regulation (EU) No 165/2014 of the European Parliament and of the Council of 4 February 2014 on tachographs in road transport(1), and in particular Articles 11 and 12(7) thereof,
Whereas:
(1) Regulation (EU) No 165/2014 has introduced second-generation digital tachographs called smart tachographs, which include a connection to the global navigation satellite system (‘GNSS’) facility, a remote early detection communication facility, and an interface with intelligent transport systems. The specifications for the technical requirements for the construction of smart tachographs should be set up.
(2) The remote early detection facility established by Article 9(4) of Regulation (EU) No 165/2014 should transmit to a roadside control officer the data of the digital tachograph and the information concerning the weights and weight per axles of the complete vehicle combination (tractor and trailers or semi-trailers), in accordance with Directive 96/53/EC of the European Parliament and of the Council(2). That should enable an effective and quick check of vehicles by the control authorities, with fewer electronic devices in the vehicle cab.
(3) In accordance with Directive 96/53/EC, the remote early detection facility should use the CEN DSRC standards(3) referred to in that Directive, at the frequency band of 5 795-5 805 MHz. As that frequency band is used for electronic tolling as well, and in order to avoid interference between tolling and control applications, control officers should not use the remote early detection facility on a toll plaza.
(4) New security mechanisms for maintaining the level of security of the digital tachograph should be introduced with the smart tachograph to address current security vulnerabilities. One of such vulnerabilities is the absence of expiry dates of digital certificates. In order to comply with the best practices in security matters, it is recommended that the use of digital certificates without expiry dates should be avoided. The normal operation validity period of vehicle units should be 15 years, starting on the issuing date of the vehicle unit digital certificates. Vehicle units should be replaced after that validity period.
(5) The provision of secured and reliable positioning information is an essential element of the effective operation of smart tachographs. Therefore, it is appropriate to ensure their compatibility with the added value services provided by the Galileo programme as set out in Regulation (EU) No 1285/2013 of the European Parliament and of the Council(4) in order to improve the security of the smart tachograph.
(6) In accordance with Articles 8(1), 9(1) and 10(1) and (2) of Regulation (EU) No 165/2014, the security mechanisms introduced by that Regulation should apply 36 months after the entry into force of the necessary implementing acts in order to allow the manufacturers to develop the new generation of smart tachographs, and receive their type-approval certificates from the competent authorities.
(7) In accordance with Regulation (EU) No 165/2014, vehicles registered for the first time in a Member State 36 months after the entry into force of this Commission Regulation, should be equipped with a smart tachograph compliant with the requirements of this Commission Regulation. In any case, all vehicles operating in a Member State other than their Member State of registration should be equipped with a compliant smart tachograph 15 years after the date of application of those requirements.
(8) Commission Regulation (EC) No 68/2009(5) allowed, during a transitional period expiring on 31 December 2013, the use of an adaptor to make possible the installation of tachographs in M1 and N1 type vehicles. Due to technical difficulties related to finding an alternative to the use of the adaptor, the experts of the automotive and tachograph industry, together with the Commission, concluded that no alternative solution to the adaptor was feasible without entailing high costs for industry, which would be disproportionate to the size of the market. Therefore, the use of the adaptor in M1 and N1 type vehicles should be allowed indefinitely.
(9) The measures provided for in this Regulation are in accordance with the opinion of the Committee referred to in Article 42(3) of Regulation (EU) No 165/2014,
HAS ADOPTED THIS REGULATION:
1.This Regulation lays down the provisions necessary for the F1... application of the following aspects regarding tachographs:
(a)recording of the position of the vehicle at certain points during the daily working period of the driver;
(b)remote early detection of possible manipulation or misuse of smart tachographs;
(c)interface with intelligent transport systems;
(d)the administrative and technical requirements for the type-approval procedures of tachographs, including the security mechanisms.
[F22.The construction, testing, installation, inspection, operation and repair of smart tachographs and their components, shall comply with the technical requirements set out in Annex IC to this Regulation.
3.Tachographs other than smart tachographs shall continue, as regards construction, testing, installation, inspection, operation and repair, to comply with the requirements of either Annex I to Regulation (EU) No 165/2014 or Annex IB to [F3Regulation (EU) No 165/2014], as applicable.]
4.F4... The remote early detection facility shall also transmit the weight data provided by [F5any internal on-board weighing system installed to aid the enforcement of requirements as to the maximum authorised weight of vehicles], for the purpose of early fraud detection.
F65.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Textual Amendments
F1Word in Art. 1(1) omitted (31.12.2020) by virtue of The Drivers' Hours and Tachographs (Amendment etc.) (EU Exit) Regulations 2019 (S.I. 2019/453), regs. 1(3), 106(2) (with reg. 114); 2020 c. 1, Sch. 5 para. 1(1)
F2Substituted by Commission Implementing Regulation (EU) 2018/502 of 28 February 2018 amending Implementing Regulation (EU) 2016/799 laying down the requirements for the construction, testing, installation, operation and repair of tachographs and their components (Text with EEA relevance).
F3Words in Art. 1(3) substituted (31.12.2020) by The Drivers' Hours and Tachographs (Amendment etc.) (EU Exit) Regulations 2019 (S.I. 2019/453), regs. 1(3), 106(3); 2020 c. 1, Sch. 5 para. 1(1)
F4Words in Art. 1(4) omitted (31.12.2020) by virtue of The Drivers' Hours and Tachographs (Amendment etc.) (EU Exit) Regulations 2019 (S.I. 2019/453), regs. 1(3), 106(4)(a) (with reg. 114); 2020 c. 1, Sch. 5 para. 1(1)
F5Words in Art. 1(4) substituted (31.12.2020) by The Drivers' Hours and Tachographs (Amendment etc.) (EU Exit) Regulations 2019 (S.I. 2019/453), regs. 1(3), 106(4)(b); 2020 c. 1, Sch. 5 para. 1(1)
F6Art. 1(5) omitted (31.12.2020) by virtue of The Drivers' Hours and Tachographs (Amendment etc.) (EU Exit) Regulations 2019 (S.I. 2019/453), regs. 1(3), 106(5) (with reg. 114); 2020 c. 1, Sch. 5 para. 1(1)
For the purposes of this Regulation, the definitions laid down in Article 2 of Regulation (EU) No 165/2014 shall apply.
In addition, the following definitions shall apply:
‘digital tachograph’ or ‘first generation tachograph’ means a digital tachograph other than a smart tachograph;
‘external GNSS facility’ means a facility which contains the GNSS receiver when the vehicle unit is not a single unit, as well as other components needed to protect the communication of data about position to the rest of the vehicle unit;
[F2‘information folder’ means the complete folder, in electronic or paper form, containing all the information supplied by the manufacturer or its agent to the [F7Secretary of State] for the purpose of the type-approval of a tachograph or a component thereof, including the certificates referred to in Article 12(3) of Regulation (EU) No 165/2014, the performance of the tests defined in Annex IC to this Regulation, as well as drawings, photographs, and other relevant documents;]
‘information package’ means the information folder, in electronic or paper form, accompanied by any other documents added by the [F8Secretary of State] to the information folder in the course of carrying out their functions including, at the end of the type-approval process, the F9... type-approval certificate of the tachograph or a component thereof;
‘index to the information package’ means the document listing the numbered contents of the information package identifying all the relevant parts of this package. The format of that document shall distinguish the successive steps in the F10... type-approval process, including the dates of any revisions and updating of that package;
‘remote early detection facility’ means the equipment of the vehicle unit which is used to perform targeted roadside checks;
[F2‘smart tachograph’ or ‘second generation tachograph’ means a digital tachograph complying with Articles 8, 9 and 10 of Regulation (EU) No 165/2014 as well as with Annex IC to this Regulation;]
[F2‘tachograph component’ means any of the following elements: the vehicle unit, the motion sensor, the record sheet, the external GNSS facility and the external remote early detection facility;]
F11...
[F12‘vehicle unit’ means the tachograph excluding the motion sensor and the cables connecting the motion sensor.
It may be a single unit or several units distributed in the vehicle and includes a processing unit, a data memory, a time measurement function, two smart card interface devices for driver and co-driver, a printer, a display, connectors and facilities for entering the user’s inputs, a GNSS receiver and a remote communication facility.
The vehicle unit may be composed of the following components subject to type-approval:
vehicle unit, as a single component (including GNSS receiver and remote communication facility),
vehicle unit main body (including remote communication facility), and external GNSS facility,
vehicle unit main body (including GNSS receiver), and external remote communication facility,
vehicle unit main body, external GNSS facility, and external remote communication facility.
If the vehicle unit is composed of several units distributed in the vehicle, the vehicle unit main body is the unit containing the processing unit, the data memory, and the time measurement function.
‘vehicle unit (VU)’ is used for ‘vehicle unit’ or ‘vehicle unit main body’.]
Textual Amendments
F2Substituted by Commission Implementing Regulation (EU) 2018/502 of 28 February 2018 amending Implementing Regulation (EU) 2016/799 laying down the requirements for the construction, testing, installation, operation and repair of tachographs and their components (Text with EEA relevance).
F7Words in Art. 2 substituted (31.12.2020) by The Drivers' Hours and Tachographs (Amendment etc.) (EU Exit) Regulations 2019 (S.I. 2019/453), regs. 1(3), 107(2); 2020 c. 1, Sch. 5 para. 1(1)
F8Words in Art. 2 substituted (31.12.2020) by The Drivers' Hours and Tachographs (Amendment etc.) (EU Exit) Regulations 2019 (S.I. 2019/453), regs. 1(3), 107(3)(a); 2020 c. 1, Sch. 5 para. 1(1)
F9Word in Art. 2 omitted (31.12.2020) by virtue of The Drivers' Hours and Tachographs (Amendment etc.) (EU Exit) Regulations 2019 (S.I. 2019/453), regs. 1(3), 107(3)(b) (with reg. 114); 2020 c. 1, Sch. 5 para. 1(1)
F10Word in Art. 2 omitted (31.12.2020) by virtue of The Drivers' Hours and Tachographs (Amendment etc.) (EU Exit) Regulations 2019 (S.I. 2019/453), regs. 1(3), 107(4) (with reg. 114); 2020 c. 1, Sch. 5 para. 1(1)
F11Words in Art. 2 omitted (31.12.2020) by virtue of The Drivers' Hours and Tachographs (Amendment etc.) (EU Exit) Regulations 2019 (S.I. 2019/453), regs. 1(3), 107(5) (with reg. 114); 2020 c. 1, Sch. 5 para. 1(1)
1.Manufacturers shall ensure that smart tachographs are compatible with the positioning services provided by the Galileo and the European Geostationary Navigation Overlay Service (‘EGNOS’) systems.
2.In addition to the systems referred to in paragraph 1, manufacturers may also choose to ensure compatibility with other satellite navigation systems.
1.A manufacturer or its agent shall submit an application for type-approval of a tachograph or any of its components, or group of components, to [F13the Secretary of State]. It shall consist of an information folder containing the information for each of the components concerned including, where applicable, the type-approval certificates of other components necessary to complete the tachograph, as well as any other relevant documents.
2.[F14The Secretary of State] shall grant type-approval to any tachograph, component or group of components that conforms to the administrative and technical requirements referred to in Article 1(2) or (3), as applicable. In that case, the [F15Secretary of State] shall issue to the applicant a type-approval certificate that shall conform to the model laid down in Annex II to this Regulation.
3.The [F16Secretary of State] may request the manufacturer or its agent to supply any additional information.
4.The manufacturer or its agent shall make available to the [F17Secretary of State], as well as to the [F18persons] responsible for issuing the certificates referred to in Article 12(3) of Regulation (EU) No 165/2014, as many tachographs or tachograph components as are necessary to enable the type-approval procedure to be conducted satisfactorily.
5.Where the manufacturer or its agent seeks a type-approval of certain components or groups of components of a tachograph, he shall provide the [F19Secretary of State] with the other components, already type-approved, as well as other parts necessary for the construction of the complete tachograph, in order for [F20the Secretary of State] to conduct the necessary tests.
Textual Amendments
F13Words in Art. 4(1) substituted (31.12.2020) by The Drivers' Hours and Tachographs (Amendment etc.) (EU Exit) Regulations 2019 (S.I. 2019/453), regs. 1(3), 108(2); 2020 c. 1, Sch. 5 para. 1(1)
F14Words in Art. 4(2) substituted (31.12.2020) by The Drivers' Hours and Tachographs (Amendment etc.) (EU Exit) Regulations 2019 (S.I. 2019/453), regs. 1(3), 108(3)(a); 2020 c. 1, Sch. 5 para. 1(1)
F15Words in Art. 4(2) substituted (31.12.2020) by The Drivers' Hours and Tachographs (Amendment etc.) (EU Exit) Regulations 2019 (S.I. 2019/453), regs. 1(3), 108(3)(b); 2020 c. 1, Sch. 5 para. 1(1)
F16Words in Art. 4(3) substituted (31.12.2020) by The Drivers' Hours and Tachographs (Amendment etc.) (EU Exit) Regulations 2019 (S.I. 2019/453), regs. 1(3), 108(4); 2020 c. 1, Sch. 5 para. 1(1)
F17Words in Art. 4(4) substituted (31.12.2020) by The Drivers' Hours and Tachographs (Amendment etc.) (EU Exit) Regulations 2019 (S.I. 2019/453), regs. 1(3), 108(5)(a); 2020 c. 1, Sch. 5 para. 1(1)
F18Word in Art. 4(4) substituted (31.12.2020) by The Drivers' Hours and Tachographs (Amendment etc.) (EU Exit) Regulations 2019 (S.I. 2019/453), regs. 1(3), 108(5)(b); 2020 c. 1, Sch. 5 para. 1(1)
F19Words in Art. 4(5) substituted (31.12.2020) by The Drivers' Hours and Tachographs (Amendment etc.) (EU Exit) Regulations 2019 (S.I. 2019/453), regs. 1(3), 108(6)(a); 2020 c. 1, Sch. 5 para. 1(1)
F20Words in Art. 4(5) substituted (31.12.2020) by The Drivers' Hours and Tachographs (Amendment etc.) (EU Exit) Regulations 2019 (S.I. 2019/453), regs. 1(3), 108(6)(b); 2020 c. 1, Sch. 5 para. 1(1)
1.The manufacturer or its agent shall inform [F21the Secretary of State without delay], about any modification in software or hardware of the tachograph or in the nature of the materials used for its manufacture which are recorded in the information package and shall submit an application for the modification of the type-approval.
2.The [F22Secretary of State] may revise or extend an existing type-approval, or issue a new type-approval according to the nature and characteristics of the modifications.
A ‘revision’ shall be made where the [F23Secretary of State] considers that the modifications in software or hardware of the tachograph or in the nature of materials used for its manufacture are minor. In such cases, the [F23Secretary of State] shall issue the revised documents of the information package, indicating the nature of the modifications made and the date of their approval. An updated version of the information package in a consolidated form, accompanied by a detailed description of the modifications made, shall be sufficient to meet this requirement.
An ‘extension’ shall be made where the [F23Secretary of State] considers that the modifications in software or hardware of the tachograph or in the nature of materials used for its manufacture are substantial. In such cases, it may request that new tests be conducted and inform the manufacturer or its agent accordingly. If those tests prove satisfactory, the [F23Secretary of State] shall issue a revised type-approval certificate containing a number referring to the extension granted. The type-approval certificate shall mention the reason of the extension and its date of issue.
3.The index to the information package shall indicate the date of the most recent extension or revision of the type-approval, or the date of the most recent consolidation of the updated version of the type-approval.
4.A new type-approval shall be necessary when the requested modifications to the type-approved tachograph or its components would lead to the issuance of a new security or interoperability certificate.
Textual Amendments
F21Words in Art. 5(1) substituted (31.12.2020) by The Drivers' Hours and Tachographs (Amendment etc.) (EU Exit) Regulations 2019 (S.I. 2019/453), regs. 1(3), 109(a); 2020 c. 1, Sch. 5 para. 1(1)
F22Words in Art. 5(2) substituted (31.12.2020) by The Drivers' Hours and Tachographs (Amendment etc.) (EU Exit) Regulations 2019 (S.I. 2019/453), regs. 1(3), 109(b)(i); 2020 c. 1, Sch. 5 para. 1(1)
F23Words in Art. 5(2) substituted (31.12.2020) by The Drivers' Hours and Tachographs (Amendment etc.) (EU Exit) Regulations 2019 (S.I. 2019/453), regs. 1(3), 109(b)(ii); 2020 c. 1, Sch. 5 para. 1(1)
This Regulation shall enter into force on the twentieth day following that of its publication in the Official Journal of the European Union.
It shall apply from 2 March 2016.
[F2However, Annex IC shall apply from 15 June 2019 with the exception of Appendix 16 which shall apply from 2 March 2016 .]
Textual Amendments
F24...
Textual Amendments
F24Words in Signature omitted (31.12.2020) by virtue of The Drivers' Hours and Tachographs (Amendment etc.) (EU Exit) Regulations 2019 (S.I. 2019/453), regs. 1(3), 110 (with reg. 114); 2020 c. 1, Sch. 5 para. 1(1)
Modifications etc. (not altering text)
C1Annex 1C modified (21.8.2023) by The Drivers’ Hours and Tachographs (Amendment) Regulations 2023 (S.I. 2023/739), regs. 1(1), 3, Sch.
The first generation digital tachograph system has been deployed since 1 May 2006. It may be used until its end of life for domestic transportation. For international transportation, instead, 15 years after the entry into force of this Commission Regulation, all vehicles shall be equipped with a compliant second generation smart tachograph, introduced by this Regulation.
This Annex contains second generation recording equipment and tachograph cards requirements. Starting from its introduction date, second generation recording equipment shall be installed in vehicles registered for the first time, and second generation tachograph cards shall be issued.
In order to foster a smooth introduction of the second generation tachograph system:
second generation tachograph cards shall be designed to be also used in first generation vehicle units,
replacement of valid first generation tachograph cards at the introduction date shall not be requested.
This will allow drivers to keep their unique driver card and use both systems with it.
Second generation recording equipment shall however only be calibrated using second generation workshop cards.
This Annex contains all requirements related to the interoperability between the first and the second generation tachograph system.
Appendix 15 contains additional details about how the coexistence of the two systems shall be managed.
In this Annex:
‘activation’ means:
the phase in which the tachograph becomes fully operational and implements all functions, including security functions, through the use of a workshop card;
‘authentication’ means:
a function intended to establish and verify a claimed identity;
‘authenticity’ means:
the property that information is coming from a party whose identity can be verified;
‘built-in test (BIT)’ means:
tests run at request, triggered by the operator or by external equipment;
‘calendar day’ means:
a day ranging from 00:00 hours to 24:00 hours. All calendar days relate to UTC time (Universal Time Coordinated);
‘calibration’ of a smart tachograph means:
updating or confirming vehicle parameters to be held in the data memory. Vehicle parameters include vehicle identification (VIN, VRN and registering Member State) and vehicle characteristics (w, k, l, tyre size, speed-limiting device setting (if applicable), current UTC time, current odometer value); during the calibration of a recording equipment, the types and identifiers of all type-approval relevant seals in place shall also be stored in the data memory;
any update or confirmation of UTC time only, shall be considered as a time adjustment and not as a calibration, provided it does not contradict Requirement 409;
calibrating recording equipment requires the use of a workshop card;
‘card number’ means:
a 16-alphanumerical character number that uniquely identifies a tachograph card within a Member State. The card number includes a card consecutive index (if applicable), a card replacement index and a card renewal index;
a card is therefore uniquely identified by the code of the issuing Member State and the card number;
‘card consecutive index’ means:
the 14th alphanumerical character of a card number that is used to differentiate the different cards issued to a company, a workshop or a control authority entitled to be issued several tachograph cards. The company, the workshop or the control authority is uniquely identified by the 13 first characters of the card number;
‘card renewal index’ means:
the 16th alphanumerical character of a card number which is incremented each time a tachograph card is renewed;
‘card replacement index’ means:
the 15th alpha-numerical character of a card number which is incremented each time a tachograph card is replaced;
‘characteristic coefficient of the vehicle’ means:
the numerical characteristic giving the value of the output signal emitted by the part of the vehicle linking it with the recording equipment (gearbox output shaft or axle) while the vehicle travels a distance of one kilometre under standard test conditions as defined under requirement 414. The characteristic coefficient is expressed in impulses per kilometre (w = … imp/km);
‘company card’ means:
a tachograph card issued by the authorities of a Member State to a transport undertaking needing to operate vehicles fitted with a tachograph, which identifies the transport undertaking and allows for the displaying, downloading and printing of the data, stored in the tachograph, which have been locked by that transport undertaking;
‘constant of the recording equipment’ means:
the numerical characteristic giving the value of the input signal required to show and record a distance travelled of one kilometre; this constant shall be expressed in impulses per kilometre (k = … imp/km);
‘continuous driving time’ is computed within the recording equipment as(6):
the continuous driving time is computed as the current accumulated driving times of a particular driver, since the end of his last AVAILABILITY or BREAK/REST or UNKNOWN(7) period of 45 minutes or more (this period may have been split according to Regulation (EC) No 561/2006 of the European Parliament and of the Council(8)). The computations involved take into account, as needed, past activities stored on the driver card. When the driver has not inserted his card, the computations involved are based on the data memory recordings related to the current period where no card was inserted and related to the relevant slot;
‘control card’ means:
a tachograph card issued by the authorities of a Member State to a national competent control authority which identifies the control body and, optionally, the control officer, and which allows access to the data stored in the data memory or in the driver cards and, optionally, in the workshop cards for reading, printing and/or downloading;
It shall also give access to the roadside calibration checking function and to data on the remote early detection communication reader;
‘cumulative break time’ is computed within the recording equipment as(6):
the cumulative break from driving time is computed as the current accumulated AVAILABILITY or BREAK/REST or UNKNOWN(7) times of 15 minutes or more of a particular driver, since the end of his last AVAILABILITY or BREAK/REST or UNKNOWN(7) period of 45 minutes or more (this period may have been split according to Regulation (EC) No 561/2006).
The computations involved take into account, as needed, past activities stored on the driver card. Unknown periods of negative duration (start of unknown period > end of unknown period) due to time overlaps between two different sets of recording equipment, are not taken into account for the computation.
When the driver has not inserted his card, the computations involved are based on the data memory recordings related to the current period where no card was inserted and related to the relevant slot;
‘data memory’ means:
an electronic data storage device built into the recording equipment;
‘digital signature’ means:
data appended to, or a cryptographic transformation of, a block of data that allows the recipient of the block of data to prove the authenticity and integrity of the block of data;
‘downloading’ means:
the copying, together with the digital signature, of a part, or of a complete set, of data files recorded in the data memory of the vehicle unit or in the memory of a tachograph card, provided that this process does not alter or delete any stored data;
manufacturers of smart tachograph vehicle units and manufacturers of equipment designed and intended to download data files shall take all reasonable steps to ensure that the downloading of such data can be performed with the minimum delay by transport undertakings or drivers;
The downloading of the detailed speed file may not be necessary to establish compliance with Regulation (EC) No 561/2006, but may be used for other purposes such as accident investigation;
‘driver card’ means:
a tachograph card, issued by the authorities of a Member State to a particular driver, which identifies the driver and allows for the storage of driver activity data;
‘effective circumference of the wheels’ means:
the average of the distances travelled by each of the wheels moving the vehicle (driving wheels) in the course of one complete rotation. The measurement of these distances shall be made under standard test conditions as defined under requirement 414 and is expressed in the form ‘l = … mm’. Vehicle manufacturers may replace the measurement of these distances by a theoretical calculation which takes into account the distribution of the weight on the axles, vehicle unladen in normal running order(9). The methods for such theoretical calculation are subject to approval by a competent Member State authority and can take place only before tachograph activation;
‘event’ means:
an abnormal operation detected by the smart tachograph which may result from a fraud attempt;
‘external GNSS facility’ means
a facility which contains the GNSS receiver when the vehicle unit is not a single unit as well as other components needed to protect the communication of position data to the rest of the vehicle unit;
‘fault’ means:
abnormal operation detected by the smart tachograph which may come from an equipment malfunction or failure;
‘GNSS receiver’ means:
an electronic device that receives and digitally processes the signals from one or more Global Navigation Satellite System(s) (GNSS in English) in order to provide position, speed and time information;
‘installation’ means:
the mounting of a tachograph in a vehicle;
‘interoperability’ means:
the capacity of systems and the underlying business processes to exchange data and to share information;
‘interface’ means:
a facility between systems which provides the media through which they can connect and interact;
‘position’ means:
geographical coordinates of the vehicle at a given time;
‘motion sensor’ means:
a part of the tachograph, providing a signal representative of vehicle speed and/or distance travelled;
‘non-valid card’ means:
a card detected as faulty, or which initial authentication failed, or whose start of validity date is not yet reached, or whose expiry date has passed;
‘open standard’ means:
a standard set out in a standard specification document available freely or at a nominal charge which it is permissible to copy, distribute or use for no fee or for a nominal fee;
‘out of scope’ means:
when the use of the recording equipment is not required, according to the provisions of Regulation (EC) No 561/2006;
‘over speeding’ means:
exceeding the authorised speed of the vehicle, defined as any period of more than 60 seconds during which the vehicle's measured speed exceeds the limit for setting the speed limitation device laid down in Council Directive 92/6/EEC(10), as last amended;
‘periodic inspection’ means:
a set of operations performed to check that the tachograph works properly, that its settings correspond to the vehicle parameters, and that no manipulation devices are attached to the tachograph;
‘printer’ means:
component of the recording equipment which provides printouts of stored data;
‘remote early detection communication’ means:
communication between the remote early detection communication facility and the remote early detection communication reader during targeted roadside checks with the aim of remotely detecting possible manipulation or misuse of recording equipment;
[F2‘remote communication facility’ or ‘remote early detection facility’ means:
the equipment of the vehicle unit which is used to perform targeted roadside checks;]
‘remote early detection communication reader’ means:
the system used by control officers for targeted roadside checks.
‘renewal’ means:
issue of a new tachograph card when an existing card reaches its expiry date, or is malfunctioning and has been returned to the issuing authority. Renewal always implies the certainty that two valid cards do not coexist;
‘repair’ means:
any repair of a motion sensor or of a vehicle unit or of a cable that requires the disconnection of its power supply, or its disconnection from other tachograph components, or the opening of the motion sensor or vehicle unit;
‘card replacement’ means:
issue of a tachograph card in replacement of an existing card, which has been declared lost, stolen or malfunctioning and has not been returned to the issuing authority. Replacement always implies a risk that two valid cards may coexist;
‘security certification’ means:
process to certify, by a common criteria certification body, that the recording equipment (or component) or the tachograph card under investigation fulfils the security requirements defined in the relative protection profiles;
‘self test’ means:
tests run cyclically and automatically by the recording equipment to detect faults;
‘time measurement’ means:
a permanent digital record of the coordinated universal date and time (UTC);
[F2‘time adjustment’ means:
an adjustment of current time; this adjustment can be automatic at regular intervals, using the time provided by the GNSS receiver as a reference, or performed in calibration mode;]
‘tyre size’ means:
the designation of the dimensions of the tyres (external driving wheels) in accordance with Council Directive 92/23/EEC(11) as last amended;
‘vehicle identification’ means:
numbers identifying the vehicle: vehicle registration number (VRN) with indication of the registering Member State and vehicle identification number (VIN)(12);
for computing sake in the recording equipment ‘week’ means:
the period between 00:00 hours UTC on Monday and 24:00 UTC on Sunday;
‘workshop card’ means:
a tachograph card issued by the authorities of a Member State to designated staff of a tachograph manufacturer, a fitter, a vehicle manufacturer or a workshop, approved by that Member State, which identifies the cardholder and allows for the testing, calibration and activation of tachographs, and/or downloading from them;
‘adaptor’ means:
a device, providing a signal permanently representative of vehicle speed and/or distance travelled, other than the one used for the independent movement detection, and which is:
[F2installed and used only in M1 and N1 type vehicles (as defined in Annex II to Directive 2007/46/EC of the European Parliament and of the Council(13), as last amended),]
installed where it is not mechanically possible to install any other type of existing motion sensor which is otherwise compliant with the provisions of this Annex and its Appendixes 1 to 15,
installed between the vehicle unit and where the speed/distance impulses are generated by integrated sensors or alternative interfaces,
seen from a vehicle unit, the adaptor behaviour is the same as if a motion sensor, compliant with the provisions of this Annex and its Appendixes 1 to 16, was connected to the vehicle unit;
use of such an adaptor in those vehicles described above shall allow for the installation and correct use of a vehicle unit compliant with all the requirements of this Annex,
for those vehicles, the smart tachograph includes cables, an adaptor, and a vehicle unit;
‘data integrity’ means:
the accuracy and consistency of stored data, indicated by an absence of any alteration in data between two updates of a data record. Integrity implies that the data is an exact copy of the original version, e.g. that it has not been corrupted in the process of being written to, and read back from, a tachograph card or a dedicated equipment or during transmission via any communications channel;
‘data privacy’ means:
the overall technical measures taken to ensure the proper implementation of the principles laid down in Directive 95/46/EC of the European Parliament and of the Council(14) as well as of those laid down in Directive 2002/58/EC of the European Parliament and of the Council(15);
‘smart tachograph’ system means:
the recording equipment, tachograph cards and the set of all directly or indirectly interacting equipment during their construction, installation, use, testing and control, such as cards, remote communication reader and any other equipment for data downloading, data analysis, calibration, generating, managing or introducing security elements, etc.;
‘introduction date’:
36 months after the entry into force of the detailed provisions referred to in Article 11 of Regulation (EU) No 165/2014 of the European Parliament and of the Council(16)
This is the date after which vehicles registered for the first time:
shall be fitted with a tachograph connected to a positioning service based on a satellite navigation system,
shall be able to communicate data for targeted roadside checks to competent control authorities while the vehicle is in motion,
and may be equipped with standardised interfaces allowing the data recorded or produced by tachographs to be used in operational mode, by an external device.
‘protection profile’ means:
a document used as part of certification process according Common Criteria, providing implementation independent specification of information assurance security requirements;
‘GNSS accuracy’:
in the context of recording the position from a Global Navigation Satellite System (GNSS) with tachographs, means the value of the horizontal dilution of precision (HDOP) calculated as the minimum of the HDOP values collected on the available GNSS systems[F2;]
[F12‘accumulated driving time’ means:
a value representing the total accumulated number of minutes of driving of a particular vehicle.
The accumulated driving time value is a free running count of all minutes regarded as DRIVING by the monitoring of driving activities function of the recording equipment, and is only used for triggering the recording of the vehicle position, every time a multiple of three hours of accumulated driving is reached. The accumulation is started at the recording equipment activation. It is not affected by any other condition, like out of scope or ferry/train crossing.
The accumulated driving time value is not intended to be displayed, printed, or downloaded.]
The purpose of the recording equipment is to record, store, display, print, and output data related to driver activities.
Any vehicle fitted with the recording equipment complying with the provisions of this Annex, must include a speed display and an odometer. These functions may be included within the recording equipment.
The recording equipment may be connected to other facilities through additional interfaces and/or through the optional ITS interface.
Recording equipment users identify themselves to the equipment via tachograph cards.
The recording equipment records and stores data in its data memory, in the remote communication facility and in tachograph cards.
This is done in accordance with Directive 95/46/EC of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data(17), with Directive 2002/58/EC of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector(18) and in compliance with Article 7 of Regulation (EU) No. 165/2014.
monitoring cards insertions and withdrawals,
speed, distance and position measurement,
time measurement,
monitoring driver activities,
monitoring driving status,
drivers manual entries:
entry of places where daily work periods begin and/or end,
manual entry of driver activities,
entry of specific conditions,
company locks management,
monitoring control activities,
detection of events and/or faults,
built-in and self-tests,
reading from data memory,
recording and storing in data memory,
reading from tachograph cards,
recording and storing in tachograph cards,
displaying,
printing,
warning,
data downloading to external media,
remote communication for targeted roadside checks,
output data to additional facilities,
calibration,
roadside calibration check,
time adjustment.
operational mode,
control mode,
calibration mode,
company mode.
a In these situations the recording equipment shall use only the tachograph card inserted in the driver slot. | ||||||
| Mode of operation | Driver slot | |||||
|---|---|---|---|---|---|---|
| No card | Driver card | Control card | Workshop card | Company card | ||
| Co-driver slot | No card | Operational | Operational | Control | Calibration | Company |
| Driver card | Operational | Operational | Control | Calibration | Company | |
| Control card | Control | Control | Controla | Operational | Operational | |
| Workshop card | Calibration | Calibration | Operational | Calibrationa | Operational | |
| Company card | Company | Company | Operational | Operational | Companya | |
the calibration function is accessible in the calibration mode only,
the roadside calibration checking function is accessible in the control mode only,
the company locks management function is accessible in the company mode only,
the monitoring of control activities function is operational in the control mode only,
The downloading function is not accessible in the operational mode (except as provided for in requirement 193), and except downloading a driver card when no other card type is inserted into the VU.
in the operational mode, any personal identification (surname and first name(s)) not corresponding to a tachograph card inserted shall be blanked and any card number not corresponding to a tachograph card inserted shall be partially blanked (every odd character — from left to right — shall be blanked),
in the company mode, driver related data (requirements 102, 105 and 108) can be output only for periods where no lock exists or no other company holds a lock (as identified by the first 13 digits of the company card number),
when no card is inserted in the recording equipment, driver related data can be output only for the current and 8 previous calendar days,
personal data originating from the VU shall not be output through ITS interface of the VU unless the consent of the driver to whom the data relates is verified,
[F2the vehicle units have a normal operations validity period of 15 years, starting with the vehicle unit certificates effective date, but vehicle units can be used for additional 3 months, for data downloading only.]
[F2The system security aims at protecting the data memory in such a way as to prevent unauthorised access to and manipulation of the data and detecting any such attempts, protecting the integrity and authenticity of data exchanged between the motion sensor and the vehicle unit, protecting the integrity and authenticity of data exchanged between the recording equipment and the tachograph cards, protecting the integrity and authenticity of data exchanged between the vehicle unit and the external GNSS facility, if any, protecting the confidentiality, integrity and authenticity of data exchanged through the remote early detection communication for control purposes, and verifying the integrity and authenticity of data downloaded.]
vehicle unit,
tachograph card,
motion sensor,
external GNSS facility (this Profile is only needed and applicable for the external GNSS variant).
If a card with the same card number and a higher renewal index has already been inserted in the recording equipment, the card shall be declared as non-valid.
If a card with the same card number and renewal index but with a higher replacement index has already been inserted in the recording equipment, the card shall be declared as non-valid.
positions where the driver and/or the co-driver begins his daily work period;
[F2positions where the accumulated driving time reaches a multiple of three hours;]
positions where the driver and/or the co-driver ends his daily work period.
so as to cumulate both forward and reverse movements, or
so as to include only forward movement.
± 1 % before installation,
± 2 % on installation and periodic inspection,
± 4 % in use.
a ± 2 km/h tolerance for input variations (tyre variations, …),
a ± 1 km/h tolerance in measurements made during installation or periodic inspections,
the recording equipment shall, for speeds between 20 and 180 km/h, and for characteristic coefficients of the vehicle between 4 000 and 25 000 imp/km, measure the speed with a tolerance of ± 1 km/h (at constant speed).
Note: The resolution of data storage brings an additional tolerance of ± 0,5 km/h to speed stored by the recording equipment.U.K.
Under the following conditions temporary entry made at last card withdrawal is validated (i.e. shall not be overwritten anymore):
entry of a place where the current daily work period begins during manual entry according to requirement (61);
the next entry of a place where the current daily work period begins if the card holder doesn’t enter any place where the work period begins or ended during the manual entry according to requirement (61).
Under the following conditions temporary entry made at last card withdrawal is overwritten and the new value is validated:
the next entry of a place where the current daily work period ends if the card holder doesn’t enter any place where the work period begins or ended during the manual input according to requirement (61).]
At driver or workshop card insertion the cardholder shall be reminded of:
the date and time of his last card withdrawal;
optionally: the local time offset currently set for the vehicle unit.
At the first insertion of a given driver card or workshop card currently unknown to the vehicle unit, the cardholder shall be invited to express his consent for tachograph related personal data output through the optional ITS interface.
At any moment, the driver (resp. workshop) consent can be enabled or disabled through commands in the menu, provided the driver (resp. workshop) card is inserted.
It shall be possible to input activities with the following restrictions:
Activity type shall be WORK, AVAILABILITY or BREAK/REST;
Start and end times for each activity shall be within the period of the last card withdrawal — current insertion only;
Activities shall not be allowed to overlap mutually in time.
It shall be possible to make manual entries, if required, at the first insertion of a previously unused driver (or workshop) card.
The procedure for manual entries of activities shall include as many consecutive steps as necessary to set a type, a start time and an end time for each activity. For any part of the time period between last card withdrawal and current card insertion, the cardholder shall have the option not to declare any activity.
During the manual entries associated with card insertion and if applicable, the card holder shall have the opportunity to input:
[F2a place where a previous daily work period ended, associated to the relevant time (thus overwriting and validating the entry made at the last card withdrawal),
a place where the current daily work period begins, associated to the relevant time (thus validating a temporary entry made at last card withdrawal).]
If the card holder doesn't enter any place where the work period begins or ended, during the manual entries associated with card insertion, this shall be considered as a declaration that his work period has not changed since the last card withdrawal. The next entry of a place where a previous daily work period ends shall then overwrite the temporary entry made at the last card withdrawal.
If a place is entered, it shall be recorded in the relevant tachograph card.
Manual entries shall be interrupted if:
the card is withdrawn or,
the vehicle is moving and the card is in the driver slot.
Additional interruptions are allowed, e.g. a timeout after a certain period of user inactivity. If manual entries are interrupted, the recording equipment shall validate any complete place and activity entries (having either unambiguous place and time, or activity type, begin time and end time) already made.
If a second driver or workshop card is inserted while manual entries of activities are in progress for a previously inserted card, the manual entries for this previous card shall be allowed to be completed before manual entries start for the second card.
The cardholder shall have the option to insert manual entries according to the following minimum procedure:
Enter activities manually, in chronological order, for the period last card withdrawal — current insertion.
Begin time of the first activity shall be set to card withdrawal time. For each subsequent entry, the start time shall be preset to immediately follow the end time of the previous entry. Activity type and end time shall be selected for each activity.
The procedure shall end when the end time of a manually entered activity equals the card insertion time. The recording equipment may then optionally allow the card holder to modify any activity manually entered, until validation by selection of a specific command. Thereafter, any such modification shall be forbidden.
‘OUT OF SCOPE’ (begin, end)
‘FERRY / TRAIN CROSSING’ (begin, end).
A ‘FERRY / TRAIN CROSSING’ may not occur if an ‘OUT OF SCOPE’ condition is opened.
An opened ‘OUT OF SCOPE’ condition must be automatically closed, by the recording equipment, if a driver card is inserted or withdrawn.
An opened ‘OUT OF SCOPE’ condition shall inhibit the following events and warnings:
Driving without an appropriate card,
Warnings associated with continuous driving time.
The FERRY / TRAIN CROSSING begin flag shall be set before shutting down the engine on the ferry/train.
An opened FERRY / TRAIN CROSSING must end when any of following options occurs:
The driver manually ends the FERRY/TRAIN CROSSING
The driver ejects his card
An opened FERRY/TRAIN CROSSING shall end when it is no longer valid based on the rules stated in Regulation (EC) No. 561/2006.
| Card conflict | Driver slot | |||||
|---|---|---|---|---|---|---|
| No card | Driver card | Control card | Workshop card | Company card | ||
| Co-driver slot | No card | |||||
| Driver card | X | |||||
| Control card | X | X | X | |||
| Workshop card | X | X | X | X | ||
| Company card | X | X | X | |||
| Driving without an appropriate card | Driver slot | |||||
|---|---|---|---|---|---|---|
| No (or non-valid) card | Driver card | Control card | Workshop card | Company card | ||
| Co-driver slot | No (or non-valid) card | X | X | X | ||
| Driver card | X | X | X | X | ||
| Control card | X | X | X | X | X | |
| Workshop card | X | X | X | X | ||
| Company card | X | X | X | X | X | |
VU internal fault
Printer fault
Display fault
Downloading fault
Sensor fault
GNSS receiver or external GNSS facility fault
Remote Communication facility fault
[F12ITS interface fault (if applicable)]
| Sub-assembly to test | Self-test | Built-in-test |
|---|---|---|
| Software | Integrity | |
| Data memory | Access | Access, data integrity |
| Card interface devices | Access | Access |
| Keyboard | Manual check | |
| Printer | (up to manufacturer) | Printout |
| Display | Visual check | |
Downloading (performed only during downloading) | Proper operation | |
| Sensor | Proper operation | Proper operation |
| Remote communication facility | Proper operation | Proper operation |
| GNSS facility | Proper operation | Proper operation |
| [F12ITS interface (optional) | Proper operation ] |
For the purpose of this paragraph,
‘365 days’ is defined as 365 calendar days of average drivers' activity in a vehicle. The average activity per day in a vehicle is defined as at least 6 drivers or co-drivers, 6 card insertion withdrawal cycles, and 256 activity changes. ‘365 days’ therefore include at least 2 190 (co-)drivers, 2 190 card insertion withdrawal cycles, and 93 440 activity changes,
[F2the average number of positions per day is defined as at least 6 positions where the daily work period begins, 6 positions when the accumulated driving time reaches a multiple of three hours, and 6 positions where the daily work period ends, so that ‘365 days’ include at least 6 570 positions,]
times are recorded with a resolution of one minute, unless otherwise specified,
odometer values are recorded with a resolution of one kilometre,
speeds are recorded with a resolution of 1 km/h,
positions (latitudes and longitudes) are recorded in degrees and minutes, with a resolution of 1/10 of minute, with the associated GNSS accuracy and acquisition time.
name of the manufacturer,
address of the manufacturer,
part number,
serial number,
VU generation,
ability to use first generation tachograph cards,
software version number,
software version installation date,
year of equipment manufacture,
approval number,
name of the manufacturer,
serial number,
approval number,
embedded security component identifier (e.g. internal chip/processor part number),
operating system identifier (e.g. software version number).
The following data shall be recorded for each of these pairings:
motion sensor identification data:
serial number
approval number
motion sensor pairing data:
pairing date.
name of the manufacturer,
serial number,
approval number,
embedded security component identifier (e.g. internal chip/processor part number),
operating system identifier (e.g. software version number).
The following data shall be recorded for each of these couplings:
external GNSS facility identification data:
serial number,
approval number,
external GNSS facility coupling data:
coupling date
the card holder's surname and first name(s) as stored in the card,
the card's number, issuing Member State and expiry date as stored in the card,
the card generation,
the insertion date and time,
the vehicle odometer value at card insertion,
the slot in which the card is inserted,
the withdrawal date and time,
the vehicle odometer value at card withdrawal,
the following information about the previous vehicle used by the driver, as stored in the card:
VRN and registering Member State,
VU generation (when available),
card withdrawal date and time,
a flag indicating whether, at card insertion, the card holder has manually entered activities or not.
the driving status (CREW, SINGLE),
the slot (DRIVER, CO-DRIVER),
the card status in the relevant slot (INSERTED, NOT INSERTED),
the activity (DRIVING, AVAILABILITY, WORK, BREAK/REST),
the date and time of the change.
INSERTED means that a valid driver or workshop card is inserted in the slot. NOT INSERTED means the opposite i.e. no valid driver or workshop card is inserted in the slot (e.g. a company card is inserted or no card is inserted)
Activity data manually entered by a driver are not recorded in the data memory.
places and positions where the driver and/or co-driver begins his daily work period;
positions where the accumulated driving time reaches a multiple of three hours;
places and positions where the driver and/or the co-driver ends his daily work period.]
the (co-)driver card number and card issuing Member State,
the card generation,
the date and time of the entry,
[F2the type of entry (begin, end or 3 hours accumulated driving time),]
the related GNSS accuracy, date and time if applicable;
the vehicle odometer value.
For the purpose of this subparagraph, time shall be recorded with a resolution of 1 second.
| Event | Storage rules | Data to be recorded per event |
|---|---|---|
| Insertion of a non-valid card |
|
|
| Card conflict |
|
|
| Driving without an appropriate card |
|
|
| Card insertion while driving |
|
|
| Last card session not correctly closed |
|
|
| Over speeding (1) |
|
|
| Power supply interruption (2) |
|
|
| Communication error with the remote communication facility |
|
|
| Absence of position information from GNSS receiver |
|
|
| [F12Communication error with the external GNSS facility |
|
|
| Motion data error |
|
|
| Vehicle motion conflict |
|
|
| Security breach attempt |
|
|
| [F2Time conflict |
|
|
The recording equipment shall also record and store in its data memory:
the date and time of the last OVER SPEEDING CONTROL,
the date and time of the first over speeding following this OVER SPEEDING CONTROL,
the number of over speeding events since the last OVER SPEEDING CONTROL.
These data may be recorded at power supply reconnection only, times may be known with an accuracy to the minute.
For the purpose of this subparagraph, time shall be recorded with a resolution of 1 second.
| Fault | Storage rules | Data to be recorded per fault |
|---|---|---|
| Card fault |
|
|
| Recording equipment faults |
|
|
known calibration parameters at the moment of activation,
its very first calibration following its activation,
its first calibration in the current vehicle (as identified by its VIN),
the 20 most recent calibrations (if several calibrations happen within one calendar day, only the first and the last one of the day shall be stored).
purpose of calibration (activation, first installation, installation, periodic inspection),
workshop name and address,
workshop card number, card issuing Member State and card expiry date,
vehicle identification,
parameters updated or confirmed: w, k, l, tyre size, speed limiting device setting, odometer (old and new values), date and time (old and new values),
the types and identifiers of all the seals in place.
first pairing with a VU (date, time, VU approval number, VU serial number),
last pairing with a VU (date, time, VU approval number, VU serial number).
first coupling with a VU (date, time, VU approval number, VU serial number),
last coupling with a VU (date, time, VU approval number, VU serial number).
the most recent time adjustment,
the 5 largest time adjustments.
date and time, old value,
date and time, new value,
workshop name and address,
workshop card number, card issuing Member State, card generation and card expiry date.
date and time of the control,
control card number, card issuing Member State and card generation,
type of the control (displaying and/or printing and/or VU downloading and/or card downloading and/or roadside calibration checking).
lock-in date and time,
lock-out date and time,
company card number, card issuing Member State and card generation,
company name and address.
Data previously locked by a lock removed from memory due to the limit above, shall be treated as not locked.
date and time of downloading,
company or workshop card number, card issuing Member State and card generation,
company or workshop name.
date and time of the entry,
type of specific condition.
the tachograph card number and its serial number,
the manufacturer of the tachograph card,
the tachograph card type,
the tachograph card version.
to identify the card type, the card holder, the previously used vehicle, the date and time of the last card withdrawal and the activity selected at that time,
to check that last card session was correctly closed,
to compute the driver's continuous driving time, cumulative break time and cumulated driving times for the previous and the current week,
to print requested printouts related to data recorded on a driver card,
to download a driver card to external media.
This requirement only applies to first generation tachograph cards if their use has not been suppressed by a workshop.
default data,
data related to warnings,
data related to menu access,
other data requested by a user.
Additional information may be displayed by the recording equipment, provided that it is clearly distinguishable from information required above.
Displaying format is specified in Appendix 5.
the local time (as a result of UTC time + offset as set by the driver),
the mode of operation,
the current activity of the driver and the current activity of the co-driver,
information related to the driver:
if his current activity is DRIVING, his current continuous driving time and his current cumulative break time,
if his current activity is not DRIVING, the current duration of this activity (since it was selected) and his current cumulative break time.
the UTC date and time, and local time offset,
the content of any of the six printouts under the same formats as the printouts themselves,
the continuous driving time and cumulative break time of the driver,
the continuous driving time and cumulative break time of the co-driver,
the cumulated driving time of the driver for the previous and the current week,
the cumulated driving time of the co-driver for the previous and the current week,
optional:
the current duration of co-driver activity (since it was selected),
the cumulated driving time of the driver for current week,
the cumulated driving time of the co-driver for the current daily work period,
the cumulated driving time of the driver for the current daily work period.
Printout lines devoted to hand-written information may be omitted for display.
driver activities from card daily printout,
driver activities from Vehicle Unit daily printout,
events and faults from card printout,
events and faults from Vehicle Unit printout,
technical data printout,
over speeding printout.
tachograph card data history for a given VU (see chapter 3.12.16)
The detailed format and content of these printouts are specified in Appendix 4.
Additional data may be provided at the end of the printouts.
Additional printouts may also be provided by the recording equipment, if clearly distinguishable from the seven aforementioned printouts.
either automatically select the driver card or the workshop card if one only of these cards is inserted,
or provide a command to select the source card or select the card in the driver slot if two of these cards are inserted in the recording equipment.
the latest security breach attempt,
the longest power supply interruption,
sensor fault,
motion data error,
vehicle motion conflict,
driving without a valid card,
card insertion while driving,
time adjustment data,
calibration data including the dates of the two latest stored calibration records,
vehicle registration number,
speed recorded by the tachograph.
In Appendix 13, an optional ITS interface is specified and standardized. Other vehicle unit interfaces may co-exist, provided they fully comply with the requirements of Appendix 13 in term of minimum list of data, security and driver consent.
The driver consent doesn’t apply to data transmitted by the recording equipment to the vehicle network. In case the personal data injected in the vehicle network are further processed outside the vehicle network, it is the responsibility of the vehicle manufacturer to have that personal data process compliant with Regulation (EU) 2016/679 (‘General Data Protection Regulation’).
The driver consent doesn’t apply either to tachograph data downloaded to a remote company (requirement 193), as this scenario is monitored by the company card access right.
The following requirements apply to ITS data made available through that interface:
these data are a set of selected existing data from the tachograph data dictionary (Appendix 1),
a subset of these selected data are marked ‘personal data’,
the subset of ‘personal data’ is only available if the verifiable consent of the driver, accepting his personal data can leave the vehicle network, is enabled,
At any moment, the driver consent can be enabled or disabled through commands in the menu, provided the driver card is inserted,
the set and subset of data will be broadcasted via Bluetooth wireless protocol in the radius of the vehicle cab, with a refresh rate of 1 minute,
the pairing of the external device with the ITS interface will be protected by a dedicated and random PIN of at least 4 digits, recorded in and available through the display of each vehicle unit,
in any circumstances, the presence of the ITS interface cannot disturb or affect the correct functioning and the security of the vehicle unit.
Other data may also be output in addition to the set of selected existing data, considered as the minimum list, provided they cannot be considered as personal data.
The recording equipment shall have the capacity to communicate the driver consent status to other platforms in the vehicle network.
When the ignition of the vehicle is ON, these data shall be permanently broadcasted.]
to automatically pair the motion sensor with the VU,
to automatically couple the external GNSS facility with the VU if applicable,
to digitally adapt the constant of the recording equipment (k) to the characteristic coefficient of the vehicle (w),
to adjust the current time within the validity period of the inserted workshop card,
to adjust the current odometer value,
to update motion sensor identification data stored in the data memory,
to update, if applicable, external GNSS facility identification data stored in the data memory,
to update the types and identifiers of all the seals in place,
to update or confirm other parameters known to the recording equipment: vehicle identification, w, l, tyre size and speed limiting device setting if applicable.
updating motion sensor installation data held by the motion sensor (as needed),
copying from the motion sensor to the VU data memory the necessary motion sensor identification data.
updating external GNSS facility installation data held by the external GNSS facility (as needed),
copying from the external GNSS facility to the VU data memory the necessary external GNSS facility identification data including the serial number of the external GNSS facility,
The coupling shall be followed by the verification of the GNSS position information.
react to a magnetic field disturbing vehicle motion detection. In such circumstances, the vehicle unit will record and store a sensor fault (requirement 88) or,
have a sensing element that is protected from, or immune to, magnetic fields.
near the figure indicating the distance, the unit of measurement of distance, indicated by the abbreviation ‘km’,
near the figure showing the speed, the entry ‘km/h’.
The recording equipment may also be switched to display the speed in miles per hour, in which case the unit of measurement of speed shall be shown by the abbreviation ‘mph’. The recording equipment may also be switched to display the distance in miles, in which case the unit of measurement of distance shall be shown by the abbreviation ‘mi’.
name and address of the manufacturer,
manufacturer's part number and year of manufacture,
serial number,
type-approval mark.
The front page shall contain:
B BG CZ CY | Belgium Bulgaria Czech Republic Cyprus | LV L LT M | Latvia Luxembourg Lithuania Malta |
| DK | Denmark | NL | The Netherlands |
D EST | Germany Estonia | A PL | Austria Poland |
| GR | Greece | P RO SK SLO | Portugal Romania Slovakia Slovenia |
| E | Spain | FIN | Finland |
F HR H | France Croatia Hungary | S | Sweden |
| IRL | Ireland | UK | The United Kingdom |
| I | Italy |
| Driver card | Control Card | Company or Workshop card | |
|---|---|---|---|
| 1. | surname of the driver | control body name | company or workshop name |
| 2. | first name(s) of the driver | surname of the controller (if applicable) | surname of card holder (if applicable) |
| 3. | birth date of the driver | first name(s) of the controller (if applicable) | first name(s) of card holder (if applicable) |
| 4.a | card start of validity date | ||
| 4.b | card expiry date | ||
| 4.c | the name of the issuing authority (may be printed on reverse page) | ||
| 4.d | a different number from the one under heading 5, for administrative purposes (optional) | ||
| 5. a | Driving licence number (at the date of issue of the driver card) | — | — |
| 5. b | Card number | ||
| 6. | Photograph of the driver | photograph of the controller (optional) | photograph of the fitter (optional)- |
| 7. | Signature of the holder (optional) | ||
| 8. | Normal place of residence, or postal address of the holder (optional). | Postal address of control body | postal address of company or workshop |
The reverse page shall contain:
:
white,
:
blue,
:
red,
:
yellow.
a security design background with fine guilloche patterns and rainbow printing,
in the area of the photograph, the security design background and the photograph shall overlap,
at least one two-coloured microprint line.
The system security aims at protecting integrity and authenticity of data exchanged between the cards and the recording equipment, protecting the integrity and authenticity of data downloaded from the cards, allowing certain write operations onto the cards to recording equipment only, decrypting certain data, ruling out any possibility of falsification of data stored in the cards, preventing tampering and detecting any attempt of that kind.
ISO/IEC 7810 Identification cards — Physical characteristics,
ISO/IEC 7816 Identification cards — Integrated circuit cards:
Part 1: Physical characteristics,
Part 2: Dimensions and position of the contacts (ISO/IEC 7816-2:2007),
Part 3: Electrical interface and transmission protocols (ISO/IEC 7816-3:2006),
Part 4: Organisation, security and commands for interchange (ISO/IEC 7816-4:2013 + Cor 1:2014),
Part 6: Interindustry data elements for interchange (ISO/IEC 7816-6:2004 + Cor 1:2006),
Part 8: Commands for security operations (ISO/IEC 7816-8:2004).
Tachograph cards shall be tested in accordance to ISO/IEC 10373-3:2010 Identification cards — Test methods — Part 3: Integrated circuit cards with contacts and related interface devices.
For the purpose of this paragraph,
times are recorded with a resolution of one minute, unless otherwise specified,
odometer values are recorded with a resolution of one kilometre,
speeds are recorded with a resolution of 1 km/h,
positions (latitudes and longitudes) are recorded in degrees and minutes with a resolution of 1/10 of minute.
The tachograph cards functions, commands and logical structures, fulfilling data storage requirements are specified in Appendix 2.
If not otherwise specified, data storage on tachograph cards shall be organized in such a way, that new data replaces stored oldest data in case the foreseen memory size for the particular records is exhausted.
DF Tachograph, which contains the application accessible to first generation vehicle units, which is also present in first generation tachograph cards,
DF Tachograph_G2, which contains the application only accessible to second generation vehicle units, which is only present in second generation tachograph cards.
The full details of the tachograph cards structure are specified in Appendix 2.
clock stop,
card serial number (including manufacturing references),
card type approval number,
card personaliser identification (ID),
embedder ID,
IC identifier.
IC serial number,
IC manufacturing references.
in the case the tachograph card supports extended length fields, the extended length information data object specified in Appendix 2.
in the case the tachograph card supports extended length fields, the extended length information data objects specified in Appendix 2.
tachograph application identification,
type of tachograph card identification.
card number,
issuing Member State, issuing authority name, issue date,
card beginning of validity date, card expiry date.
surname of the holder,
first name(s) of the holder,
date of birth,
preferred language.
date and time of last card download (for other purposes than control).
issuing Member State, issuing authority name,
driving licence number (at the date of the issue of the card).
For the purpose of this subparagraph, time shall be stored with a resolution of 1 second.
Time overlap (where this card is the cause of the event),
Card insertion while driving (where this card is the subject of the event),
Last card session not correctly closed (where this card is the subject of the event),
Power supply interruption,
Motion data error,
Security breach attempts.
Event code,
Date and time of beginning of the event (or of card insertion if the event was on-going at that time),
Date and time of end of the event (or of card withdrawal if the event was on-going at that time),
VRN and registering Member State of vehicle in which the event happened.
Note: For the ‘Time overlap’ event:U.K.
Date and time of beginning of the event shall correspond to the date and time of the card withdrawal from the previous vehicle,
Date and time of end of the event shall correspond to the date and time of card insertion in current vehicle,
Vehicle data shall correspond to the current vehicle raising the event.
Note: For the ‘Last card session not correctly closed’ event:U.K.
date and time of beginning of event shall correspond to the card insertion date and time of the session not correctly closed,
date and time of end of event shall correspond to the card insertion date and time of the session during which the event was detected (current session),
Vehicle data shall correspond to the vehicle in which the session was not correctly closed.
For the purpose of this subparagraph, time shall be recorded with a resolution of 1 second.
[F2Card fault (where this card is the subject of the fault),]
Recording equipment fault.
Fault code,
Date and time of beginning of the fault (or of card insertion if the fault was on-going at that time),
Date and time of end of the fault (or of card withdrawal if the fault was on-going at that time),
VRN and registering Member State of vehicle in which the fault happened.
the date,
a daily presence counter (increased by one for each of these calendar days),
the total distance travelled by the driver during this day,
a driver status at 00:00,
whenever the driver has changed of activity, and/or has changed of driving status, and/or has inserted or withdrawn his card:
the driving status (CREW, SINGLE),
the slot (DRIVER, CO-DRIVER),
the card status (INSERTED, NOT INSERTED),
the activity (DRIVING, AVAILABILITY, WORK, BREAK/REST),
the time of the change.
date and time of first use of the vehicle (i.e. first card insertion for this period of use of the vehicle, or 00h00 if the period of use is on-going at that time),
vehicle odometer value at that time,
date and time of last use of the vehicle, (i.e. last card withdrawal for this period of use of the vehicle, or 23h59 if the period of use is on-going at that time),
vehicle odometer value at that time,
VRN and registering Member State of the vehicle.
the date and time of the entry (or the date/time related to the entry if the entry is made during the manual entry procedure),
the type of entry (begin or end, condition of entry),
the country and region entered,
the vehicle odometer value.
date and time the session was opened (i.e. card insertion) with a resolution of one second,
VRN and registering Member State.
date and time of the control,
control card number and card issuing Member State,
type of the control (displaying and/or printing and/or VU downloading and/or card downloading (see note)),
Period downloaded, in case of downloading,
VRN and registering Member State of the vehicle in which the control happened.
Note: card downloading will only be recorded if performed through a recording equipment.U.K.
Date and time of the entry,
Type of specific condition.
tachograph application identification,
type of tachograph card identification.
card number,
issuing Member State, issuing authority name, issue date,
card beginning of validity date, card expiry date.
surname of the holder,
first name(s) of the holder,
date of birth,
preferred language.
date and time of last card download (for other purposes than control).
issuing Member State, issuing authority name,
driving licence number (at the date of the issue of the card).
For the purpose of this subparagraph, time shall be stored with a resolution of 1 second.
Time overlap (where this card is the cause of the event),
Card insertion while driving (where this card is the subject of the event),
Last card session not correctly closed (where this card is the subject of the event),
Power supply interruption,
Communication error with the remote communication facility,
Absence of position information from GNSS receiver event,
Communication error with the external GNSS facility
Motion data error,
Vehicle motion conflict,
Security breach attempts,
Time conflict.
Event code,
Date and time of beginning of the event (or of card insertion if the event was on-going at that time),
Date and time of end of the event (or of card withdrawal if the event was on-going at that time),
VRN and registering Member State of vehicle in which the event happened.
Note: For the ‘Time overlap’ event:U.K.
Date and time of beginning of the event shall correspond to the date and time of the card withdrawal from the previous vehicle,
Date and time of end of the event shall correspond to the date and time of card insertion in current vehicle,
Vehicle data shall correspond to the current vehicle raising the event.
Note: For the ‘Last card session not correctly closed’ event:U.K.
date and time of beginning of event shall correspond to the card insertion date and time of the session not correctly closed,
date and time of end of event shall correspond to the card insertion date and time of the session during which the event was detected (current session),
Vehicle data shall correspond to the vehicle in which the session was not correctly closed.
For the purpose of this subparagraph, time shall be recorded with a resolution of 1 second.
[F2Card fault (where this card is the subject of the fault),]
Recording equipment fault.
Fault code,
Date and time of beginning of the fault (or of card insertion if the fault was on-going at that time),
Date and time of end of the fault (or of card withdrawal if the fault was on-going at that time),
VRN and registering Member State of vehicle in which the fault happened.
the date,
a daily presence counter (increased by one for each of these calendar days),
the total distance travelled by the driver during this day,
a driver status at 00:00,
whenever the driver has changed of activity, and/or has changed of driving status, and/or has inserted or withdrawn his card:
the driving status (CREW, SINGLE)
the slot (DRIVER, CO-DRIVER),
the card status (INSERTED, NOT INSERTED),
the activity (DRIVING, AVAILABILITY, WORK, BREAK/REST).
the time of the change,
date and time of first use of the vehicle (i.e. first card insertion for this period of use of the vehicle, or 00h00 if the period of use is on-going at that time),
vehicle odometer value at that first use time,
date and time of last use of the vehicle, (i.e. last card withdrawal for this period of use of the vehicle, or 23h59 if the period of use is on-going at that time),
vehicle odometer value at that last use time,
VRN and registering Member State of the vehicle,
VIN of the vehicle.
the date and time of the entry (or the date/time related to the entry if the entry is made during the manual entry procedure),
the type of entry (begin or end, condition of entry),
the country and region entered,
the vehicle odometer value,
the vehicle position,
the GNSS accuracy, date and time when the position was determined.
date and time the session was opened (i.e. card insertion) with a resolution of one second,
VRN and registering Member State.
date and time of the control,
control card number and card issuing Member State,
type of the control (displaying and/or printing and/or VU downloading and/or card downloading (see note)),
Period downloaded, in case of downloading,
VRN and registering Member State of the vehicle in which the control happened.
Note: security requirements imply that card downloading will only be recorded if performed through a recording equipment.U.K.
Date and time of the entry,
Type of specific condition.
the date and time of the beginning of the period of use of the vehicle unit (i.e. first card insertion in the vehicle unit for the period),
the manufacturer of the vehicle unit,
the vehicle unit type,
the vehicle unit software version number.
the date and time when the accumulated driving time reaches a multiple of three hours,
the position of the vehicle,
the GNSS accuracy, date and time when the position was determined,
the vehicle odometer value.
tachograph application identification,
type of tachograph card identification.
card number,
issuing Member State, issuing authority name, issue date,
card beginning of validity date, card expiry date.
workshop name,
workshop address,
surname of the holder,
first name(s) of the holder,
preferred language.
Purpose of calibration (activation, first installation, installation, periodic inspection,),
Vehicle identification,
Parameters updated or confirmed (w, k, l, tyre size, speed limiting device setting, odometer (new and old values), date and time (new and old values)),
Recording equipment identification (VU part number, VU serial number, motion sensor serial number).
tachograph application identification,
type of tachograph card identification.
card number,
issuing Member State, issuing authority name, issue date,
card beginning of validity date, card expiry date.
workshop name,
workshop address,
surname of the holder,
first name(s) of the holder,
preferred language.
purpose of calibration (activation, first installation, installation, periodic inspection,),
vehicle identification,
parameters updated or confirmed (w, k, l, tyre size, speed limiting device setting, odometer (new and old values), date and time (new and old values),
recording equipment identification (VU part number, VU serial number, motion sensor serial number, remote communication facility serial number and external GNSS facility serial number, if applicable),
seal type and identifier of all seals in place,
ability of the VU to use first generation tachograph cards (enabled or not).
the date and time of the beginning of the period of use of the vehicle unit (i.e. first card insertion in the vehicle unit for the period),
the manufacturer of the vehicle unit,
the vehicle unit type,
the vehicle unit software version number.
the date and time when the accumulated driving time reaches a multiple of three hours,
the position of the vehicle,
the GNSS accuracy, date and time when the position was determined,
the vehicle odometer value.
tachograph application identification,
type of tachograph card identification.
card number,
issuing Member State, issuing authority name, issue date,
card beginning of validity date, card expiry date (if any).
control body name,
control body address,
surname of the holder,
first name(s) of the holder,
preferred language.
date and time of the control,
type of the control (displaying and/or printing and/or VU downloading and/or card downloading and/or roadside calibration checking),
period downloaded (if any),
VRN and Member State registering authority of the controlled vehicle,
card number and card issuing Member State of the driver card controlled.
tachograph application identification,
type of tachograph card identification.
card number,
issuing Member State, issuing authority name, issue date,
card beginning of validity date, card expiry date (if any).
control body name,
control body address,
surname of the holder,
first name(s) of the holder,
preferred language.
date and time of the control,
type of the control (displaying and/or printing and/or VU downloading and/or card downloading and/or roadside calibration checking)
period downloaded (if any),
VRN and Member State registering authority of the controlled vehicle,
card number and card issuing Member State of the driver card controlled.
tachograph application identification,
type of tachograph card identification.
card number,
issuing Member State, issuing authority name, issue date,
card beginning of validity date, card expiry date (if any).
company name,
company address.
date and time of the activity,
type of the activity (VU locking in and/or out, and/or VU downloading and/or card downloading)
period downloaded (if any),
VRN and Member State registering authority of vehicle,
card number and card issuing Member State (in case of card downloading).
tachograph application identification,
type of tachograph card identification.
card number,
issuing Member State, issuing authority name, issue date,
card beginning of validity date, card expiry date (if any).
company name,
company address.
date and time of the activity,
type of the activity (VU locking in and/or out, and/or VU downloading and/or card downloading)
period downloaded (if any),
VRN and Member State registering authority of vehicle,
card number and card issuing Member State (in case of card downloading).
After every inspection by an approved fitter or workshop, a new plaque shall be affixed in place of the previous one.
name, address or trade name of the approved fitter or workshop,
characteristic coefficient of the vehicle, in the form ‘w = … imp/km’,
constant of the recording equipment, in the form ‘k = … imp/km’,
effective circumference of the wheel tyres in the form ‘l = … mm’,
tyre size,
the date on which the characteristic coefficient of the vehicle and the effective circumference of the wheel tyres were measured,
the vehicle identification number,
the presence (or not) of an external GNSS facility,
the serial number of the external GNSS facility, if applicable,
the serial number of the remote communication device, if any,
the serial number of all the seals in place,
the part of the vehicle where the adaptor, if any, is installed,
the part of the vehicle where the motion sensor is installed, if not connected to the gear-box or an adaptor is not being used,
a description of the colour of the cable between the adaptor and that part of the vehicle providing its incoming impulses,
the serial number of the embedded motion sensor of the adaptor.]
This second, additional plaque, if used, shall be affixed next to or beside the first primary plaque described in Requirement 396, and shall have the same protection level. Furthermore the secondary plaque shall also bear the name, address or trade name of the approved fitter or workshop that carried out the installation, and the date of installation.
Any connection which, if disconnected, would cause undetectable alterations to be made or undetectable data loss (this may e.g. apply for the motion sensor fitting on the gearbox, the adaptor for M1/N1 vehicles, the external GNSS connection or the vehicle unit);
The installation plaque, unless it is attached in such a way that it cannot be removed without the markings thereon being destroyed.
In case of emergency,
To install, to adjust or to repair a speed limitation device or any other device contributing to road safety, provided that the recording equipment continues to function reliably and correctly and is resealed by an approved fitter or workshop (in accordance with Chapter 6) immediately after fitting the speed limitation device or any other device contributing to road safety or within seven days in other cases.
[F2This unique identification number is defined as: MMNNNNNNNN by non-removable marking, with MM as unique manufacturer identification (database registration to be managed by EC) and NNNNNNNN seal alpha-numeric number, unique in the manufacturer domain.]
This mark shall not cover the seal identification number.
Requirements on the circumstances in which seals may be removed, as referred to in Article 22(5) of Regulation (EU) No 165/2014, are defined in Chapter 5.3 of this annex.
The Member States approve, regularly control and certify the bodies to carry out:
installations,
checks,
inspections,
repairs.
Workshop cards shall be issued only to fitters and/or workshops approved for the activation and/or the calibration of recording equipment in conformity with this annex and, unless duly justified:
who are not eligible for a company card;
and whose other professional activities do not present a potential compromise of the overall security of the system as required in Appendix 10.
that the recording equipment is working properly, including the data storage in tachograph cards function and the communication with remote communication readers,
that compliance with the provisions of chapter 3.2.1 and 3.2.2 on the maximum tolerances on installation is ensured,
that compliance with the provisions of chapter 3.2.3 and 3.3 is ensured,
that the recording equipment carries the type approval mark,
that the installation plaque, as defined by Requirement 396, and the descriptive plaque, as defined by Requirement 225, are affixed,
the tyre size and the actual circumference of the tyres,
that there are no manipulation devices attached to the equipment,
that seals are correctly placed, in good state, that their identification numbers are valid (referenced seal manufacturer in the EC database) and that their identification numbers correspond to the installation plaque markings (see requirement 401).
make a comparison between the motion sensor identification data of the motion sensor plugged into the gearbox with that of the paired motion sensor registered in the vehicle unit;
check if the information recorded on the installation plaque matches with the information contained within the vehicle unit record;
check if the motion sensor serial number and approval number, if printed on the body of the motion sensor, matches the information stored in the recording equipment data memory;
compare identification data marked on the descriptive plaque of the external GNSS facility, if any, to the ones stored in the vehicle unit data memory;
vehicle unladen, in normal running order,
tyre pressures in accordance with the manufacturer's instructions,
tyre wear, within the limits allowed by national law,
vehicle movement:
the vehicle shall advance under its own engine power in a straight line on level ground and at a speed of 50 ± 5 km/h. The measuring distance shall be at least 1 000 m.
provided that it is of comparable accuracy, alternative methods, such as a suitable test bench, may also be used for the test.
The card issuing processes set-up by the Member States shall conform to the following:
[F2For the purpose of this chapter, the words ‘recording equipment’ mean ‘recording equipment or its components’. No type approval is required for the cable(s) linking the motion sensor to the VU, the external GNSS facility to the VU or the external remote communication facility to the VU. The paper, for use by the recording equipment, shall be considered as a component of the recording equipment.
Any manufacturer may ask for type approval of recording equipment component(s) with any other recording equipment component(s), provided each component complies with the requirements of this annex. Alternately, manufacturers may also ask for type approval of recording equipment.
As described in definition (10) in Article 2 of this Regulation, vehicle units have variants in components assembly. Whatever the vehicle unit components assembly, the external antenna and (if applicable) the antenna splitter connected to the GNSS receiver or to the remote communication facility are not part of the vehicle unit type approval.
Nevertheless, manufacturers having obtained type approval for recording equipment shall maintain a publicly available list of compatible antennas and splitters with each type approved vehicle unit, external GNSS facility and external remote communication facility.]
a security certificate (if requested by this Annex),
a functional certificate,
and an interoperability certificate (if requested by this Annex)
for the recording equipment or the tachograph card, subject of the request for type approval.]
the entire set of material and documents necessary for such interoperability tests,
the corresponding security certificate,
the corresponding functional certificate,
The date of the registration of the request shall be notified to the manufacturer.
for which type approval is still valid or,
for which type approval is pending and that have a valid interoperability certificate.
for which a request for interoperability tests have been registered,
having received an interoperability certificate (even provisional),
having received a type approval certificate.
This appendix specifies data formats, data elements, and data structures for use within the recording equipment and tachograph cards.
This appendix uses Abstract Syntax Notation One (ASN.1) to define data types. This enables simple and structured data to be defined without implying any specific transfer syntax (encoding rules) which will be application and environment dependent.
ASN.1 type naming conventions are done in accordance with ISO/IEC 8824-1. This implies that:
where possible, the meaning of the data type is implied through the names being selected,
where a data type is a composition of other data types, the data type name is still a single sequence of alphabetical characters commencing with a capital letter, however capitals are used within the name to impart the corresponding meaning,
in general, the data types names are related to the name of the data types from which they are constructed, the equipment in which data is stored and the function related to the data.
If an ASN.1 type is already defined as part of another standard and if it is relevant for usage in the recording equipment, then this ASN.1 type will be defined in this appendix.
To enable several types of encoding rules, some ASN.1 types in this appendix are constrained by value range identifiers. The value range identifiers are defined in paragraph 3 and Appendix 2.
The following references are used in this Appendix:
Code for the representation of names of languages. First Edition: 1988.
Codes for the representation of names of countries and their subdivisions — Part 1: Country codes, 2013
Road vehicles — Vehicle identification number (VIN) — Content and structure. 2009
Identification cards — Integrated circuit cards — Part 5: Registration of application providers.
Second edition: 2004.
Identification cards — Integrated circuit cards — Part 6: Interindustry data elements for interchange, 2004 + Technical Corrigendum 1: 2006
Information technology — Abstract Syntax Notation One (ASN.1): Specification of basic notation. 2008 + Technical Corrigendum 1: 2012 and Technical Corrigendum 2: 2014.
Information technology — ASN.1 encoding rules: Specification of Packed Encoding Rules (PER). 2008.
Information technology — 8 bit single-byte coded graphic character sets — Part 1: Latin alphabet No.1. First edition: 1998.
Information technology — 8 bit single-byte coded graphic character sets — Part 7: Latin/Greek alphabet. 2003.
Road vehicles — Tachograph systems — Motion Sensor Interface. 2004 + Technical Corrigendum 1: 2006..
BSI / ANSSI Technical Guideline TR-03110-3, Advanced Security Mechanisms for Machine Readable Travel Documents and eIDAS Token — Part 3 Common Specifications, version 2.20, 3. February 2015
For any of the following data types, the default value for an ‘unknown’ or a ‘not applicable’ content will consist in filling the data element with ‘FF’ bytes.
All data types are used for Generation 1 and Generation 2 applications unless otherwise specified.
[F12For card data types used for Generation 1 and Generation 2 applications, the size specified in this Appendix is the one for Generation 2 application. The size for Generation 1 application is supposed to be already known by the reader. The Annex IC requirement numbers related to such data types cover both Generation 1 and Generation 2 applications.]
This data type enables to code, within a two bytes word, a slot status at 00:00 and/or a driver status at 00:00 and/or changes of activity and/or changes of driving status and/or changes of card status for a driver or a co-driver. This data type is related to Annex 1C requirements 105, 266, 291, 320, 321, 343, and 344.
For Data Memory recordings (or slot status):
Slot:
‘0’B: DRIVER,
‘1’B: CO-DRIVER,
Driving status:
‘0’B: SINGLE,
‘1’B: CREW,
Driver (or workshop) card status in the relevant slot:
‘0’B: INSERTED, a card is inserted,
‘1’B: NOT INSERTED, no card is inserted (or a card is withdrawn),
Activity:
‘00’B: BREAK/REST,
‘01’B: AVAILABILITY,
‘10’B: WORK,
‘11’B: DRIVING,
Time of the change: Number of minutes since 00h00 on the given day.
For Driver (or Workshop) card recordings (and driver status):
Slot (not relevant when ‘p’=1 except note below):
‘0’B: DRIVER,
‘1’B: CO-DRIVER,
Driving status (case ‘p’=0) or
Following activity status (case ‘p’=1):
‘0’B: SINGLE,
‘0’B: UNKNOWN
‘1’B: CREW,
‘1’B: KNOWN (=manually entered)
Card status:
‘0’B: INSERTED, the card is inserted in a recording equipment,
‘1’B: NOT INSERTED, the card is not inserted (or the card is withdrawn),
Activity (not relevant when ‘p’=1 and ‘c’=0 except note below):
‘00’B: BREAK/REST,
‘01’B: AVAILABILITY,
‘10’B: WORK,
‘11’B: DRIVING,
Time of the change: Number of minutes since 00h00 on the given day.
When the card is withdrawn:
‘s’ is relevant and indicates the slot from which the card is withdrawn,
‘c’ must be set to 0,
‘p’ must be set to 1,
‘aa’ must code the current activity selected at that time,
As a result of a manual entry, the bits ‘c’ and ‘aa’ of the word (stored in a card) may be overwritten later to reflect the entry.
An address.
codePage specifies a character set defined in Chapter 4,
address is an address encoded using the specified character set.
Generation 2:
An AES key with a length of 128, 192 or 256 bits.
Value assignment: not further specified.
Generation 2:
An AES128 key.
length denotes the length of the AES128 key in octets.
aes128Key is an AES key with a length of 128 bits.
Value assignment:
The length shall have the value 16.
Generation 2:
An AES192 key.
length denotes the length of the AES192 key in octets.
aes192Key is an AES key with a length of 192 bits.
Value assignment:
The length shall have the value 24.
Generation 2:
An AES256 key.
length denotes the length of the AES256 key in octets.
aes256Key is an AES key with a length of 256 bits.
Value assignment:
The length shall have the value 32.
BCDString is applied for Binary Code Decimal (BCD) representation. This data type is used to represent one decimal digit in one semi octet (4 bits). BCDString is based on the ISO/IEC 8824-1 ‘CharacterStringType’.
BCDString uses an ‘hstring’ notation. The leftmost hexadecimal digit shall be the most significant semi octet of the first octet. To produce a multiple of octets, zero trailing semi octets shall be inserted, as needed, from the leftmost semi octet position in the first octet.
Permitted digits are: 0, 1, .. 9.
Code explaining why a set of calibration parameters was recorded. This data type is related to Annex 1B requirements 097 and 098 and Annex 1C requirements 119.
Value assignment:
Generation 1:
reserved value,
activation: recording of calibration parameters known, at the moment of the VU activation,
first installation: first calibration of the VU after its activation,
installation: first calibration of the VU in the current vehicle,
periodic inspection.
Generation 2:
In addition to generation 1 the following values are used:
entry of VRN by company,
time adjustment without calibration,
RFU,
Manufacturer specific.
Information, stored in a card, related to the driver activities for a particular calendar day. This data type is related to Annex 1C requirements 266, 291, 320 and 343.
activityPreviousRecordLength is the total length in bytes of the previous daily record. The maximum value is given by the length of the OCTET STRING containing these records (see CardActivityLengthRange Appendix 2 paragraph 4). When this record is the oldest daily record, the value of activityPreviousRecordLength must be set to 0.
activityRecordLength is the total length in bytes of this record. The maximum value is given by the length of the OCTET STRING containing these records.
activityRecordDate is the date of the record.
activityDailyPresenceCounter is the daily presence counter for the card this day.
activityDayDistance is the total distance travelled this day.
activityChangeInfo is the set of ActivityChangeInfo data for the driver this day. It may contain at maximum 1440 values (one activity change per minute). This set always includes the activityChangeInfo coding the driver status at 00:00.
Number of bytes in a driver or a workshop card, available to store driver activity records.
Value assignment: see Appendix 2.
Type approval number of the card.
Value assignment:
The approval number shall be provided as published on the corresponding European Commission web site, i.e. for example including hyphens if any. The approval number shall be left-aligned.
Generation 1:
Certificate of the public key of a card.
Information, stored in a card, related to the identification of the card's Integrated Circuit (IC) (Annex 1C requirement 249). The icSerialNumber together with the icManufacturingReferences identifies the card chip uniquely. The icSerialNumber alone does not uniquely identify the card chip.
icSerialNumber is the IC serial number.
icManufacturingReferences is the IC manufacturer specific identifier.
A card consecutive index (definition h)).
Value assignment: (see Annex 1C chapter 7)
Order for increase: ‘0, …, 9, A, …, Z, a, …, z’
Information, stored in a driver or workshop card, related to the last control the driver has been subject to (Annex 1C requirements 274, 299, 327, and 350).
controlType is the type of the control.
controlTime is the date and time of the control.
controlCardNumber is the FullCardNumber of the control officer having performed the control.
controlVehicleRegistration is the VRN and registering Member State of the vehicle in which the control happened.
controlDownloadPeriodBegin and controlDownloadPeriodEnd is the period downloaded, in case of downloading.
Information about the actual usage of the card (Annex 1C requirement 273, 298, 326, and 349).
sessionOpenTime is the time when the card is inserted for the current usage. This element is set to zero at card removal.
sessionOpenVehicle is the identification of the currently used vehicle, set at card insertion. This element is set to zero at card removal.
Information, stored in a driver or a workshop card, related to the activities of the driver (Annex 1C requirements 267, 268, 292, 293, 321 and 344).
activityPointerOldestDayRecord is the specification of the begin of the storage place (number of bytes from the beginning of the string) of the oldest complete day record in the activityDailyRecords string. The maximum value is given by the length of the string.
activityPointerNewestRecord is the specification of the begin of the storage place (number of bytes from the beginning of the string) of the most recent day record in the activityDailyRecords string. The maximum value is given by the length of the string.
activityDailyRecords is the space available to store the driver activity data (data structure: CardActivityDailyRecord) for each calendar day where the card has been used.
Value assignment: this octet string is cyclically filled with records of CardActivityDailyRecord. At the first use storing is started at the first byte of the string. All new records are appended at the end of the previous one. When the string is full, storing continues at the first byte of the string independently of a break being inside a data element. Before placing new activity data in the string (enlarging current activityDailyRecord, or placing a new activityDailyRecord) that replaces older activity data, activityPointerOldestDayRecord must be updated to reflect the new location of the oldest complete day record, and activityPreviousRecordLength of this (new) oldest complete day record must be reset to 0.
Information, stored in a driver card, related to the card holder driver licence data (Annex 1C requirement 259 and 284).
drivingLicenceIssuingAuthority is the authority responsible for issuing the driving licence.
drivingLicenceIssuingNation is the nationality of the authority that issued the driving licence.
drivingLicenceNumber is the number of the driving licence.
Generation 1:
Information, stored in a driver or workshop card, related to the events associated with the card holder (Annex IC requirements 260 and 318).
CardEventData is a sequence, ordered by ascending value of EventFaultType, of cardEventRecords (except security breach attempts related records which are gathered in the last set of the sequence).
cardEventRecords is a set of event records of a given event type (or category for security breach attempts events).
Generation 2:
Information, stored in a driver or workshop card, related to the events associated with the card holder (Annex IC requirements 285 and 341).
CardEventData is a sequence, ordered by ascending value of EventFaultType, of cardEventRecords (except security breach attempts related records which are gathered in the last set of the sequence).
cardEventRecords is a set of event records of a given event type (or category for security breach attempts events).]
Information, stored in a driver or a workshop card, related to an event associated to the card holder (Annex 1C requirements 261, 286, 318 and 341).
eventType is the type of the event.
eventBeginTime is the date and time of beginning of event.
eventEndTime is the date and time of end of event.
eventVehicleRegistration is the VRN and registering Member State of vehicle in which the event happened.
Information, stored in a driver or a workshop card, related to the faults associated to the card holder (Annex 1C requirements 263, 288, 318, and 341).
CardFaultData is a sequence of Recording Equipment faults set of records followed by card faults set of records.
cardFaultRecords is a set of fault records of a given fault category (Recording Equipment or card).
Information, stored in a driver or a workshop card, related to a fault associated to the card holder (Annex 1C requirement 264, 289, 318, and 341).
faultType is the type of the fault.
faultBeginTime is the date and time of beginning of fault.
faultEndTime is the date and time of end of fault.
faultVehicleRegistration is the VRN and registering Member State of vehicle in which the fault happened.
Information, stored in a card, related to the identification of the integrated circuit (IC) card (Annex 1C requirement 248).
clockStop is the Clockstop mode as defined in appendix 2.
cardExtendedSerialNumber is the IC card unique serial number as further specified by the ExtendedSerialNumber data type.
cardApprovalNumber is the type approval number of the card.
cardPersonaliserID is the card personaliser ID encoded as ManufacturerCode.
embedderIcAssemblerId provides information about the embedder/IC assembler.
icIdentifier is the Identifier of the IC on the card and its IC manufacturer as defined in ISO/IEC 7816-6.
Information, stored in a card, related to the identification of the card (Annex 1C requirements 255, 280, 310, 333, 359, 365, 371, and 377).
cardIssuingMemberState is the code of the Member State issuing the card.
cardNumber is the card number of the card.
cardIssuingAuthorityName is the name of the authority having issued the Card.
cardIssueDate is the issue date of the Card to the current holder.
cardValidityBegin is the first date of validity of the card.
cardExpiryDate is the date when the validity of the card ends.
Generation 2:
Certificate of the card public key for mutual authentication with a VU. The structure of this certificate is specified in Appendix 11.
A card number as defined by definition g).
driverIdentification is the unique identification of a driver in a Member State.
ownerIdentification is the unique identification of a company or a workshop or a control body within a member state.
cardConsecutiveIndex is the card consecutive index.
cardReplacementIndex is the card replacement index.
cardRenewalIndex is the card renewal index.
The first sequence of the choice is suitable to code a driver card number, the second sequence of the choice is suitable to code workshop, control, and company card numbers.
Information, stored in a driver or a workshop card, related to the places where daily work periods begin and/or end (Annex 1C requirements 272, 297, 325, and 348).
placePointerNewestRecord is the index of the last updated place record.
Value assignment: Number corresponding to the numerator of the place record, beginning with ‘0’ for the first occurrence of the place records in the structure.
placeRecords is the set of records containing the information related to the places entered.
Generation 1:
The private key of a card.
The public key of a card.
A card renewal index (definition i)).
Value assignment : (see this Annex chapter 7).
First issue.
Order for increase: ‘0, …, 9, A, …, Z’]
A card replacement index (definition j)).
Value assignment: (see this Annex chapter VII).
Original card.
Order for increase: ‘0, …, 9, A, …, Z’
Generation 2:
Certificate of the card public key for signature. The structure of this certificate is specified in Appendix 11.
Code to distinguish between the two slots of a Vehicle Unit.
Value assignment: not further specified.
Code indicating the type of cards inserted in the two slots of the vehicle unit.
Value assignment — Octet Aligned: ‘ccccdddd’B
Identification of the type of card inserted in the co-driver slot,
Identification of the type of card inserted in the driver slot,
with the following identification codes:
no card is inserted,
a driver card is inserted,
a workshop card is inserted,
a control card is inserted,
a company card is inserted.
Generation 2:
The CardSlotsStatus plus metadata as used in the download protocol.
recordType denotes the type of the record (CardSlotsStatus). Value Assignment: See RecordType
recordSize is the size of the CardSlotsStatus in bytes.
noOfRecords is the number of records in the set records.
records is the set of CardSlotsStatus records.
Code indicating the version of the implemented structure in a tachograph card.
Value assignment: ‘aabb’H:
Index for changes of the structure.
‘00’H for Generation 1 applications
‘01’H for Generation 2 applications
Index for changes concerning the use of the data elements defined for the structure given by the high byte.
‘00’H for this version of Generation 1 applications
‘00’H for this version of Generation 2 applications
Information, stored in a driver or workshop card, related to a period of use of a vehicle during a calendar day (Annex 1C requirements 269, 294, 322, and 345).
Generation 1:
vehicleOdometerBegin is the vehicle odometer value at the beginning of the period of use of the vehicle.
vehicleOdometerEnd is the vehicle odometer value at the end of the period of use of the vehicle.
vehicleFirstUse is the date and time of the beginning of the period of use of the vehicle.
vehicleLastUse is the date and time of the end of the period of use of the vehicle.
vehicleRegistration is the VRN and the registering Member State of the vehicle.
vuDataBlockCounter is the value of the VuDataBlockCounter at last extraction of the period of use of the vehicle.
Generation 2:
In addition to generation 1 the following data element is used:
VehicleIdentificationNumber is the vehicle identification number referring to the vehicle as a whole.
Information, stored in a driver or workshop card, related to the vehicles used by the card holder (Annex 1C requirements 270, 295, 323, and 346).
vehiclePointerNewestRecord is the index of the last updated vehicle record.
Value assignment: Number corresponding to the numerator of the vehicle record, beginning with ‘0’ for the first occurrence of the vehicle records in the structure.
cardVehicleRecords is the set of records containing information on vehicles used.
Generation 2:
Information, stored in a driver or workshop card, related to a vehicle unit that was used (Annex 1C requirement 303 and 351).
timeStamp is the beginning of the period of use of the vehicle unit (i.e. first card insertion in the vehicle unit for the period).
manufacturerCode identifies the manufacturer of the Vehicle Unit.
deviceID identifies the Vehicle Unit type of a manufacturer. The value is manufacturer specific.
vuSoftwareVersion is the software version number of the Vehicle Unit.
Generation 2:
Information, stored in a driver or workshop card, related to the vehicle units used by the card holder (Annex 1C requirement 306 and 352).
vehicleUnitPointerNewestRecord is the index of the last updated vehicle unit record.
Value assignment: Number corresponding to the numerator of the vehicle unit record, beginning with ‘0’ for the first occurrence of the vehicle unit records in the structure.
cardVehicleUnitRecords is the set of records containing information on vehicle units used.
The certificate of a public key issued by a Certification Authority.
Generation 1:
Value assignment: digital signature with partial recovery of a CertificateContent according to Appendix 11 common security mechanisms: Signature (128 bytes) || Public Key remainder (58 bytes) || Certification Authority Reference (8 bytes).
Generation 2:
Value assignment: See Appendix 11
Generation 1:
The (clear) content of the certificate of a public key according to Appendix 11 common security mechanisms.
certificateProfileIdentifier is the version of the corresponding certificate.
Value assignment: ‘01h’ for this version.
certificationAuthorityReference identifies the Certification Authority issuing the certificate. It also references the Public Key of this Certification Authority.
certificateHolderAuthorisation identifies the rights of the certificate holder.
certificateEndOfValidity is the date when the certificate expires administratively.
certificateHolderReference identifies the certificate holder. It also references his Public Key.
publicKey is the public key that is certified by this certificate.
Identification of the rights of a certificate holder.
Generation 1:
tachographApplicationID is the application identifier for the tachograph application.
Value assignment: ‘FFh’‘54h’‘41h’‘43h’‘48h’‘4Fh’. This AID is a proprietary non registered application identifier in accordance with ISO/IEC 7816-5.
equipmentType is the identification of the type of equipment to which the certificate is intended.
Value assignment: in accordance with EquipmentType data type. 0 if certificate is the one of a Member State.
Generation 2:
tachographApplicationID denotes the 6 most significant bytes of the generation 2 tachograph card application identifier (AID). The AID for the tachograph card application is specified in chapter 6.2.
Value assignment:‘FF 53 4D 52 44 54’.
equipmentType is the identification of the type of equipment as specified for generation 2 to which the certificate is intended.
Value assignment: in accordance with EquipmentType data type.
Unique identification of a certificate request. It can also be used as a Vehicle Unit Public Key Identifier if the serial number of the vehicle Unit to which the key is intended is not known at certificate generation time.
requestSerialNumber is a serial number for the certificate request, unique for the manufacturer and the month below.
requestMonthYear is the identification of the month and the year of the certificate request.
Value assignment: BCD coding of Month (two digits) and Year (two last digits).
crIdentifier: is an identifier to distinguish a certificate request from an extended serial number.
Value assignment: ‘FFh’.
manufacturerCode: is the numerical code of the manufacturer requesting the certificate.
Identifier of the Public Key of a Certification Authority (a Member State or the European Certification Authority).
nationNumeric is the numerical nation code of the Certification Authority.
nationAlpha is the alphanumerical nation code of the Certification Authority.
keySerialNumber is a serial number to distinguish the different keys of the Certification Authority in the case keys are changed.
additionalInfo is a two byte field for additional coding (Certification Authority specific).
caIdentifier is an identifier to distinguish a Certification Authority Key Identifier from other Key Identifiers.
Value assignment: ‘01h’.
Information, stored in a company card, related to activities performed with the card (Annex 1C requirement 373 and 379).
companyPointerNewestRecord is the index of the last updated companyActivityRecord.
Value assignment: Number corresponding to the numerator of the company activity record, beginning with ‘0’ for the first occurrence of the company activity record in the structure.
companyActivityRecords is the set of all company activity records.
companyActivityRecord is the sequence of information related to one company activity.
companyActivityType is the type of the company activity.
companyActivityTime is the date and time of the company activity.
cardNumberInformation is the card number and the card issuing Member State of the card downloaded, if any.
vehicleRegistrationInformation is the VRN and registering Member State of the vehicle downloaded or locked in or out.
downloadPeriodBegin and downloadPeriodEnd is the period downloaded from the VU, if any.
Code indicating an activity carried out by a company using its company card.
Information, stored in a company card related to the identification of the application of the card (Annex 1C requirement 369 and 375).
typeOfTachographCardId is specifying the implemented type of card.
cardStructureVersion is specifying the the version of the structure that is implemented in the card.
noOfCompanyActivityRecords is the number of company activity records the card can store.
Information, stored in a company card, related to the cardholder identification (Annex 1C requirement 372 and 378).
companyName is the name of the holder company.
companyAddress is the address of the holder company.
cardHolderPreferredLanguage is the preferred language of the card holder.
Information, stored in a control card related to the identification of the application of the card (Annex 1C requirement 357 and 363).
typeOfTachographCardId is specifying the implemented type of card.
cardStructureVersion is specifying the version of the structure that is implemented in the card.
noOfControlActivityRecords is the number of control activity records the card can store.
Information, stored in a control card, related to control activity performed with the card (Annex 1C requirement 361 and 367).
controlPointerNewestRecord is the index of the last updated control activity record.
Value assignment: Number corresponding to the numerator of the control activity record, beginning with ‘0’ for the first occurrence of the control activity record in the structure.
controlActivityRecords is the set of all control activity records.
controlActivityRecord is the sequence of information related to one control.
controlType is the type of the control.
controlTime is the date and time of the control.
controlledCardNumber is the card number and the card issuing Member State of the card controlled.
controlledVehicleRegistration is the VRN and registering Member State of the vehicle in which the control happened.
controlDownloadPeriodBegin and controlDownloadPeriodEnd is the period eventually downloaded.
Information, stored in a control card, related to the identification of the cardholder (Annex 1C requirement 360 and 366).
controlBodyName is the name of the control body of the card holder.
controlBodyAddress is the address of the control body of the card holder.
cardHolderName is the name and first name(s) of the holder of the Control Card.
cardHolderPreferredLanguage is the preferred language of the card holder.
Code indicating the activities carried out during a control. This data type is related to Annex 1C requirements 126, 274, 299, 327, and 350.
Generation 1:
Value assignment — Octet aligned: ‘cvpdxxxx’B (8 bits)
card downloading:
‘0’B: card not downloaded during this control activity,
‘1’B: card downloaded during this control activity
VU downloading:
‘0’B: VU not downloaded during this control activity,
‘1’B: VU downloaded during this control activity
printing:
‘0’B: no printing done during this control activity,
‘1’B: printing done during this control activity
display:
‘0’B: no display used during this control activity,
‘1’B: display used during this control activity
Not used.
Generation 2:
Value assignment — Octet aligned: ‘cvpdexxx’B (8 bits)
card downloading:
‘0’B: card not downloaded during this control activity,
‘1’B: card downloaded during this control activity
VU downloading:
‘0’B: VU not downloaded during this control activity,
‘1’B: VU downloaded during this control activity
printing:
‘0’B: no printing done during this control activity,
‘1’B: printing done during this control activity
display:
‘0’B: no display used during this control activity,
‘1’B: display used during this control activity
roadside calibration checking:
‘0’B: calibration parameters not checked during this control activity,
‘1’B: calibration parameters checked during this control activity
RFU.
The current date and time of the recording equipment.
Value assignment: not further specified.
Generation 2:
The current date and time plus metadata as used in the download protocol.
recordType denotes the type of the record (CurrentDateTime). Value Assignment: See RecordType
recordSize is the size of the CurrentDateTime in bytes.
noOfRecords is the number of records in the set records.
records is a set of current date and time records.
Counter, stored in a driver or workshop card, increased by one for each calendar day the card has been inserted in a VU. This data type is related to Annex 1C requirements 266, 299, 320, and 343.
Value assignment: Consecutive Number with maximum value = 9 999, starting again with 0. At the time of first issuing of the card the number is set to 0.
Date expressed in a readily printable numeric format.
Value assignment:
Year
Month
Day
denotes explicitly no date.
Generation 2:
The date and time of the download.
Value assignment: not further specified.
Generation 2:
The date and time of the download plus metadata as used in the download protocol.
recordType denotes the type of the record (DateOfDayDownloaded). Value Assignment: See RecordType
recordSize is the size of the CurrentDateTime in bytes.
noOfRecords is the number of records in the set records.
records is the set of date and time of the download records.
A distance travelled (result of the calculation of the difference between two vehicle's odometer values in kilometers).
Value assignment: Unsigned binary. Value in km in the operational range 0 to 9 999 km.
Information, stored in a driver card related to the identification of the application of the card (Annex 1C requirement 253 and 278).
Generation 1:
typeOfTachographCardId is specifying the implemented type of card.
cardStructureVersion is specifying the the version of the structure that is implemented in the card.
noOfEventsPerType is the number of events per type of event the card can record.
noOfFaultsPerType is the number of faults per type of fault the card can record.
activityStructureLength indicates the number of bytes available for storing activity records.
noOfCardVehicleRecords is the number of vehicle records the card can contain.
noOfCardPlaceRecords is the number of places the card can record.
Generation 2:
[F2In addition to generation 1 the following data elements are used:
noOfGNSSADRecords is the number of GNSS accumulated driving records the card can store.
noOfSpecificConditionRecords is the number of specific condition records the card can store.
noOfCardVehicleUnitRecords is the number of vehicle units used records the card can store.]
Information, stored in a driver card, related to the identification of the cardholder (Annex 1C requirement 256 and 281).
cardHolderName is the name and first name(s) of the holder of the Driver Card.
cardHolderBirthDate is the date of birth of the holder of the Driver Card.
cardHolderPreferredLanguage is the preferred language of the card holder.
Generation 2:
Certificate of the external GNSS facility public key for mutual authentication with a VU. The structure of this certificate is specified in Appendix 11.
Provides information about the IC embedder.
countryCode is the 2 letter country code of the module embedder according to ISO 3166.
moduleEmbedder identifies the module embedder.
manufacturerInformation for manufacturer internal usage.
Code to distinguish between begin and end for an entry of a daily work period place and condition of the entry.
Generation 1
Value assignment: according to ISO/IEC8824-1.
Generation 2
Value assignment: according to ISO/IEC8824-1.
Code to distinguish different types of equipment for the tachograph application.
Generation 1:
Value assignment: According to ISO/IEC8824-1.
Value 0 is reserved for the purpose of designating a Member State or Europe in the CHA field of certificates.
Generation 2:
[F2The same values as in generation 1 are used with the following additions:
Generation 1:
The European public key.
Code explaining why an event or a fault has been recorded.
Value assignment:
Code qualifying an event or a fault.
Value assignment:
Generation 1:
[F2Generation 2:
Generation 2:
The extended seal identifier uniquely identifies a seal (Annex IC requirement 401).
manufacturerCode is a code of the manufacturer of the seal.
sealIdentifier is an identifier for the seal which is unique for the manufacturer.]
Unique identification of an equipment. It can also be used as an equipment Public Key Identifier.
Generation 1:
serialNumber is a serial number for the equipment, unique for the manufacturer, the equipment's type and the month and year below.
monthYear is the identification of the month and the year of manufacturing (or of serial number assignment).
Value assignment: BCD coding of Month (two digits) and Year (two last digits).
type is an identifier of the type of equipment.
Value assignment: manufacturer specific, with ‘FFh’ reserved value.
manufacturerCode: is the numerical code identifying a manufacturer of type approved equipment.
Generation 2:
serialNumber see Generation 1
monthYear see Generation 1
type indicates the type of equipment
manufacturerCode: see Generation 1.
Code fully identifying a tachograph card.
cardType is the type of the tachograph card.
cardIssuingMemberState is the code of the Member State having issued the card.
cardNumber is the card number.
Generation 2:
Code fully identifying a tachograph card and its generation.
fullcardNumber identifies the tachograph card.
generation indicates the generation of the tachograph card used.
Generation 2:
Indicates the generation of tachograph used.
Value assignment:
RFU
Generation 1
Generation 2
RFU
Generation 2:
The geo-coordinates are encoded as integers. These integers are multiples of the ±DDMM.M encoding for the latitude and ±DDDMM.M for the longitude. Here ±DD respectively ±DDD denotes the degrees and MM.M the minutes.
latitude is encoded as a multiple (factor 10) of the ±DDMM.M representation.
longitude is encoded as a multiple (factor 10) of the ±DDDMM.M representation.
Generation 2:
The accuracy of the GNSS position data (definition eee)). This accuracy is encoded as integer and is a multiple (factor 10) of the X.Y value provided by the GSA NMEA sentence.
Generation 2:
Information, stored in a driver or workshop card, related to the GNSS position of the vehicle if the accumulated driving time reaches a multiple of three hours (Annex IC requirement 306 and 354).
gnssADPointerNewestRecord is the index of the last updated GNSS accumulated driving record.
Value assignment is the number corresponding to the numerator of the GNSS accumulated driving record, beginning with '0' for the first occurrence of the GNSS accumulated driving record in the structure.
gnssAccumulatedDrivingRecords is the set of records containing the date and time the accumulated driving reaches a multiple of three hours and information on the position of the vehicle.
Generation 2:
Information, stored in a driver or workshop card, related to the GNSS position of the vehicle if the accumulated driving time reaches a multiple of three hours (Annex IC requirement 305 and 353)
timeStamp is the date and time when the accumulated driving time reaches a multiple of three hours.
gnssPlaceRecord contains information related to the position of the vehicle.
vehicleOdometerValue is the odometer value when the accumulated driving time reaches a multiple of three hours.]
Generation 2:
Information related to the GNSS position of the vehicle (Annex 1C requirements 108, 109, 110, 296, 305, 347, and 353).
timeStamp is the date and time when the GNSS position of the vehicle was determined.
gnssAccuracy is the accuracy of the GNSS position data.
geoCoordinates is the recorded location using GNSS.
Odometer value of the vehicle: Accumulated distance travelled by the vehicle during its operation.
Value assignment: Unsigned binary. Value in 1/200 km in the operating range 0 to 21 055 406 km.
A distance travelled during all or part of a journey.
Value assignment: Unsigned binary. Value in 1/200 km in the operating range 0 to 21 055 406 km.
The surname and first name(s) of a card holder.
holderSurname is the surname (family name) of the holder. This surname does not include titles.
Value assignment: When a card is not personal, holderSurname contains the same information as companyName or workshopName or controlBodyName.
holderFirstNames is the first name(s) and initials of the holder.
Generation 2:
Information if the GNSS receiver is internal or external to the vehicle unit. True means that the GNSS receiver is internal to the VU. False means that the GNSS receiver is external.
Constant of the recording equipment (definition m)).
Value assignment: Pulses per kilometer in the operating range 0 to 64 255 pulses/km.
A unique identifier of a Public Key used to reference and select the key. It also identifies the holder of the key.
The first choice is suitable to reference the public key of a Vehicle Unit, of a tachograph card or of an external GNSS facility.
The second choice is suitable to reference the public key of a Vehicle Unit (in cases where the serial number of the Vehicle Unit cannot be known at certificate generation time).
The third choice is suitable to reference the public key of a Member State.]
Generation 2:
AES key and its associated key version used for VU — Motion Sensor pairing. For details see Appendix 11.
kMWCKey is the length of the AES key concatenated with the key which is used for VU — Motion Sensor pairing.
keyVersion denotes the key version of the AES key.
Code identifying a language.
Value assignment: Two-letter lower-case coding according to ISO 639.
Date and time, stored on a driver card, of last card download (for other purposes than control) Annex 1C requirement 257 and 282. This date is updateable by a VU or any card reader.
Value assignment: not further specified.
Generation 2:
The link certificate between European Root CA key pairs.
Effective circumference of the wheel tyres (definition u)).
Value assignment: Unsigned binary, value in 1/8 mm in the operating range 0 to 8 031 mm.
Generation 2:
A cryptographic check sum of 8, 12 or 16 bytes length corresponding to the cipher suites specified in Appendix 11.]
Code identifying whether a cardholder has manually entered driver activities at card insertion or not (Annex 1B requirement 081 and Annex 1C requirement 102).
Value assignment: not further specified.
Code identifying a manufacturer of type approved equipment.
The laboratory competent for interoperability tests maintains and publishes the list of manufacturer codes on its web site (Annex 1C requirement 454).
ManufacturerCodes are provisionally assigned to developers of tachograph equipment on application to the laboratory competent for interoperability tests.
Generation 2:
Manufacturer specific error codes simplify the error analysis and maintenance of vehicle units.
manufacturerCode identifies the manufacturer of the Vehicle Unit.
manufacturerSpecificErrorCode is an error code specific to the manufacturer.
The certificate of the public key of a member state issued by the European certification authority.
Generation 2:
The member state certificate plus metadata as used in the download protocol.
recordType denotes the type of the record (MemberStateCertificate). Value Assignment: See RecordType
recordSize is the size of the MemberStateCertificate in bytes.
noOfRecords is the number of records in the set records. The value shall be set to 1 as the certficates may have different lengths.
records is the set of member state certificates.
Generation 1:
The public key of a Member State.
A name.
codePage specifies a character set defined in Chapter 4,
name is a name encoded using the specified character set.
Alphabetic reference to a country shall be in accordance with the distinguishing signs used on vehicles in international traffic (United Nations Vienna Convention on Road Traffic, 1968).
The Nation Alpha and Numeric codes shall be held on a list maintained on the website of the laboratory appointed to carry out interoperability testing, as set out in Annex 1C requirement 440.
Numerical reference to a country.
Value assignment: see data type 2.100 (NationAlpha).
Any amendment or updating of the Nation Alpha or Numeric specification described in the above paragraph shall only be made out after the appointed laboratory has obtained the views of type approved digital and smart tachograph vehicle unit manufacturers.
Number of calibration records, a workshop card can store.
Counter indicating the number of calibrations performed with a workshop card since its last download (Annex 1C requirement 317 and 340).
Value assignment: Not specified further.
Number of place records a driver or workshop card can store.
Number of vehicles used records a driver or workshop card can store.
Value assignment: see Appendix 2.
Generation 2:
Number of vehicle units used records a driver or workshop card can store.
Value assignment: see Appendix 2.
Number of company activity records, a company card can store.
Value assignment: see Appendix 2.
Number of control activity records, a control card can store.
Value assignment: see Appendix 2.
Number of events per type of event a card can store.
Value assignment: see Appendix 2.
Number of faults per type of fault a card can store.
Value assignment: see Appendix 2.
Generation 2:
Number of GNSS accumulated driving records a card can store.
Value assignment: see Appendix 2.]
Generation 2:
Number of specific condition records a card can store.
Value assignment: see Appendix 2.
Odometer value of the vehicle in a short form.
Value assignment: Unsigned binary. Value in km in the operating range 0 to 9 999 999 km.
The vehicle's odometer value at midnight on a given day (Annex 1B requirement 090 and Annex 1C requirement 113).
Value assignment: not further specified.
Generation 2:
The OdometerValueMidnight plus metadata used in the download protocol.
recordType denotes the type of the record (OdometerValueMidnight). Value Assignment: See RecordType
recordSize is the size of the OdometerValueMidnight in bytes.
noOfRecords is the number of records in the set records.
records is the set of OdometerValueMidnight records.
Number of over speeding events since the last over speeding control.
Value assignment: 0 means that no over speeding event has occurred since the last over speeding control, 1 means that one over speeding event has occurred since the last over speeding control …255 means that 255 or more over speeding events have occurred since the last over speeding control.
Information related to a place where a daily work period begins or ends (Annex 1C requirements 108, 271, 296, 324, and 347).
Generation 1:
entryTime is a date and time related to the entry.
entryTypeDailyWorkPeriod is the type of entry.
dailyWorkPeriodCountry is the country entered.
dailyWorkPeriodRegion is the region entered.
vehicleOdometerValue is the odometer value at the time of place entry.
Generation 2:
In addition to Generation 1 the following component is used:
entryGNSSPlaceRecord is the recorded location and time.
Information related to the vehicle previously used by a driver when inserting his card in a vehicle unit (Annex 1B requirement 081 and Annex 1C requirement 102).
Generation 1:
vehicleRegistrationIdentification is the VRN and the registering Member State of the vehicle.
cardWithdrawalTime is the card withdrawal date and time.
Generation 2:
In addition to generation 1 the following data element is used:
vuGeneration identifies the generation of the vehicle unit.
Generation 1:
A public RSA key.
rsaKeyModulus is the Modulus of the key pair.
rsaKeyPublicExponent is the public exponent of the key pair.
Generation 2:
Reference to a record type. This data type is used in RecordArrays.
Value assignment:
ActivityChangeInfo, CardSlotsStatus, CurrentDateTime, MemberStateCertificate, OdometerValueMidnight, DateOfDayDownloaded, SensorPaired, Signature, SpecificConditionRecord, VehicleIdentificationNumber, VehicleRegistrationNumber, VuCalibrationRecord, VuCardIWRecord, VuCardRecord, VuCertificate, VuCompanyLocksRecord, VuControlActivityRecord, VuDetailedSpeedBlock, VuDownloadablePeriod, VuDownloadActivityData, VuEventRecord, [F2VuGNSSADRecord,] VuITSConsentRecord, VuFaultRecord, VuIdentification, VuOverSpeedingControlData, VuOverSpeedingEventRecord, VuPlaceDailyWorkPeriodRecord, VuTimeAdjustmentGNSSRecord, VuTimeAdjustmentRecord, VuPowerSupplyInterruptionRecord, SensorPairedRecord, SensorExternalGNSSCoupledRecord, RFU, Manufacturer specific. |
Alphabetic reference to a region within a specified country.
Generation 1:
Value assignment:
Generation 2:
The RegionAlpha codes shall be held on a list maintained on the website of the laboratory appointed to carry out interoperability testing.
Numerical reference to a region within a specified country.
Generation 1:
Value assignment:
Generation 2:
The RegionNumeric codes shall be held on a list maintained on the website of the laboratory appointed to carry out interoperability testing.
Generation 2:
Serial number of the Remote Communication Module.
Generation 1:
The modulus of a RSA key pair.
Value assignment: Unspecified.
Generation 1:
The private exponent of a RSA key pair.
Value assignment: Unspecified.
Generation1:
The public exponent of a RSA key pair.
Value assignment: Unspecified.
Generation2:
For the definition of this data type see Appendix 14.
Generation 2:
This data type stores information about the seals that are attached to the different components of a vehicle and is intended for storage on a card. This data type is related to Annex 1C requirement 337.
noOfSealRecords is the number of records in sealRecords.
sealRecords is a set of seal records.
Generation 2:
This data type stores information about the seals that are attached to the different components of a vehicle and is intended for storage in a Vehicle Unit.
sealRecords is a set of seal records. If there are less than 5 seals available the value of the EquipmentType in all unused sealRecords shall be set to 16, i.e. unused.
Generation 2:
This data type stores information about a seal that is attached to a component. This data type is related to Annex 1C requirement 337.
equipmentType identifies the type of equipment the seal is attached to.
extendedSealIdentifier is the identifier of the seal attached to the equipment.
Type approval number of the sensor.
Generation 1:
Value assignment: Unspecified.
Generation 2:
Value assignment:
The approval number shall be provided as published on the corresponding European Commission web site, i.e. for example including hyphens if any. The approval number shall be left-aligned.
Generation 2:
Type approval number of the external GNSS facility.
Value assignment:
The approval number shall be provided as published on the corresponding European Commission web site, i.e. for example including hyphens if any. The approval number shall be left-aligned.
Generation 2:
Information, stored in a vehicle unit, related to the identification of the external GNSS facility coupled with the vehicle unit (Annex 1C requirement 100).
sensorSerialNumber is the serial number of the external GNSS facility coupled with the vehicle unit.
sensorApprovalNumber is the approval number of this external GNSS facility.
sensorCouplingDate is a date of coupling of this external GNSS facility with the vehicle unit.
Generation 2:
Information related to the identification of the external GNSS facility (Annex 1C requirement 98).
sensorSerialNumber is the extended serial number of the external GNSS facility.
sensorApprovalNumber is the approval number of the external GNSS facility.
sensorSCIdentifier is the identifier of the security component of the external GNSS facility.
sensorOSIdentifier is the identifier of the operating system of the external GNSS facility.
Generation 2:
Information, stored in an external GNSS facility, related to the installation of the external GNSS sensor (Annex 1C requirement 123).
sensorCouplingDateFirst is the date of the first coupling of external GNSS facility with a vehicle unit.
firstVuApprovalNumber is the approval number of the first vehicle unit coupled with the external GNSS facility.
firstVuSerialNumber is the serial number of the first vehicle unit paired with the external GNSS facility.
sensorCouplingDateCurrent is the date of the current coupling of external GNSS facility with a vehicle unit.
currentVuApprovalNumber is the approval number of the vehicle unit currently coupled with the external GNSS facility.
currentVUSerialNumber is the serial number of the vehicle unit currently coupled with the external GNSS facility.
Generation 2:
Identifier of the operating system of the external GNSS facility.
Value assignment: manufacturer specific.
Generation 2:
This type is used e.g. to identify the cryptographic module of the external GNSS facility.
Identifier of the security component of the external GNSS facility.
Value assignment: component manufacturer specific.
Generation 2:
Date of a coupling of the external GNSS facility with a vehicle unit.
Value assignment: Unspecified.
Generation 2:
This type is used to store the serial number of the GNSS receiver both when it is inside the VU and when it is outside the VU.
Serial number of the GNSS receiver.
Information, stored in a motion sensor, related to the identification of the motion sensor (Annex 1B requirement 077 and Annex 1C requirement 95).
sensorSerialNumber is the extended serial number of the motion sensor (includes part number and manufacturer code).
sensorApprovalNumber is the approval number of the motion sensor.
sensorSCIdentifier is the identifier of the security component of the motion sensor.
sensorOSIdentifier is the identifier of the operating system of the motion sensor.
Information, stored in a motion sensor, related to the installation of the motion sensor (Annex 1B requirement 099 and Annex 1C requirement 122).
sensorPairingDateFirst is the date of the first pairing of the motion sensor with a vehicle unit.
firstVuApprovalNumber is the approval number of the first vehicle unit paired with the motion sensor.
firstVuSerialNumber is the serial number of the first vehicle unit paired with the motion sensor.
sensorPairingDateCurrent is the date of the current pairing of the motion sensor with the vehicle unit.
currentVuApprovalNumber is the approval number of the vehicle unit currently paired with the motion sensor.
currentVUSerialNumber is the serial number of the vehicle unit currently paired with the motion sensor.
Information, stored in a workshop card, related to the security data needed for pairing motion sensors to vehicle units (Annex 1C requirement 308 and 331).
Generation 1:
Value assignment: in accordance with ISO 16844-3.
Generation 2:
As described in Appendix 11 a workshop card shall store up to three keys for VU Motion Sensor pairing. These keys have different key versions.
Identifier of the operating system of the motion sensor.
Value assignment: manufacturer specific.
Generation 1:
Information, stored in a vehicle unit, related to the identification of the motion sensor paired with the vehicle unit (Annex 1B requirement 079).
sensorSerialNumber is the serial number of the motion sensor currently paired with the vehicle unit.
sensorApprovalNumber is the approval number of the motion sensor currently paired with the vehicle unit.
sensorPairingDateFirst is the date of the first pairing with a vehicle unit of the motion sensor currently paired with the vehicle unit.
Generation 2:
Information, stored in a vehicle unit, related to the identification of a motion sensor paired with the vehicle unit (Annex 1C requirement 97).
sensorSerialNumber is the serial number of a motion sensor paired with the vehicle unit.
sensorApprovalNumber is the approval number of this motion sensor.
sensorPairingDate is a date of pairing of this motion sensor with the vehicle unit.
Date of a pairing of the motion sensor with a vehicle unit.
Value assignment: Unspecified.
Identifier of the security component of the motion sensor.
Value assignment: component manufacturer specific.
Serial number of the motion sensor.
A digital signature.
Generation 1:
Value assignment: in accordance with Appendix 11 Common security mechanisms.
Generation 2:
Value assignment: in accordance with Appendix 11 Common security mechanisms.
Generation 2:
A set of signatures plus metadata used in the download protocol.
recordType denotes the type of the record (Signature). Value Assignment: See RecordType
recordSize is the size of the Signature in bytes.
noOfRecords is the number of records in the set records. The value shall be set to 1 as the signatures may have different lengths.
records is the set of signatures.
The number of similar events for one given day (Annex 1B requirement 094 and Annex 1C requirement 117).
Value assignment: 0 is not used, 1 means that only one event of that type has occurred and has been stored on that day, 2 means that 2 events of that type has occurred on that day (one only has been stored), …255 means that 255 or more events of that type have occurred on that day.
Information, stored in a driver card, a workshop card or a vehicle unit, related to a specific condition (requirements Annex 1C 130, 276, 301, 328, and 355).
entryTime is the date and time of the entry.
specificConditionType is the code identifying the specific condition.
Information, stored in a driver card, a workshop card or a vehicle unit, related to a specific condition (Annex 1C requirement 131, 277, 302, 329, and 356).
Generation 2:
conditionPointerNewestRecord is the index of the last updated specific condition record.
Value assignment: Number corresponding to the numerator of the specific condition record, beginning with ‘0’ for the first occurrence of the specific condition record in the structure.
specificConditionRecords is the set of records containing information on the specific conditions recorded.
Code identifying a specific condition (Annex 1B requirements 050b, 105a, 212a and 230a and Annex 1C requirements 62).
Generation 1:
Value assignment:
RFU
Out of scope — Begin
Out of scope — End
Ferry / Train crossing
RFU
Generation 2:
Value assignment:
RFU
Out of scope — Begin
Out of scope — End
Ferry / Train crossing — Begin
Ferry / Train crossing — End
RFU
Speed of the vehicle (km/h).
Value assignment: kilometers per hour in the operational range 0 to 220 km/h.
Maximum authorised Speed of the vehicle (definition hh)).
Average speed in a previously defined duration (km/h).
Maximum speed measured in a previously defined duration.
Generation 2:
For the definition of this data type see Appendix 14.
Generation 1:
A triple DES session key.
Value assignment: not further specified.
Code for a combined date and time field, where the date and time are expressed as seconds past 00h.00m.00s. on 1 January 1970 UTC.
Value assignment – Octet aligned : Number of seconds since midnight 1 January 1970 UTC.
The max. possible date/time is in the year 2106.]
Designation of tyre dimensions.
Value assignment: in accordance with Directive 92/23 (EEC) 31/03/92 O.J. L129 p.95.
Vehicle Identification Number (VIN) referring to the vehicle as a whole, normally chassis serial number or frame number.
Value assignment: As defined in ISO 3779.
Generation 2:
The Vehicle Idenification Number plus metadata as used in the download protocol.
recordType denotes the type of the record (VehicleIdentificationNumber). Value Assignment: See RecordType
recordSize is the size of the VehicleIdentificationNumber in bytes.
noOfRecords is the number of records in the set records.
records is the set of vehicle identification numbers.
Identification of a vehicle, unique for Europe (VRN and Member State).
vehicleRegistrationNation is the nation where the vehicle is registered.
vehicleRegistrationNumber is the registration number of the vehicle (VRN).
Registration number of the vehicle (VRN). The registration number is assigned by the vehicle licensing authority.
codePage specifies a character set defined in Chapter 4,
vehicleRegNumber is a VRN encoded using the specified character set.
Value assignment: Country specific.
Generation 2:
The Vehicle Registration Number plus metadata as used in the download protocol.
recordType denotes the type of the record (VehicleRegistrationNumber). Value Assignment: See RecordType
recordSize is the size of the VehicleRegistrationNumber in bytes.
noOfRecords is the number of records in the set records.
records is the set of vehicle registration numbers.
Generation 2:
Information stored in a VU on the ability of the VU to use generation 1 tachograph cards or not (Annex 1C requirement 121).
Value assignment — Octet Aligned:‘xxxxxxxa’B (8 bits)
For the ability to support of generation 1:
Ability to support generation 1 tachograph cards:
‘0’ B Generation 1 is supported,
‘1’B Generation1 is not supported,
RFU
Generation 1:
Information, stored in a VU, related to changes of activity and/or changes of driving status and/or changes of card status for a given calendar day (Annex 1B requirement 084 and Annex 1C requirement 105, 106, 107) and to slots status at 00:00 that day.
noOfActivityChanges is the number of ActivityChangeInfo words in the activityChangeInfos set.
activityChangeInfos is the set of ActivityChangeInfo words stored in the VU for the day. It always includes two ActivityChangeInfo words giving the status of the two slots at 00:00 that day.
Generation 2:
Information, stored in a VU, related to changes of activity and/or changes of driving status and/or changes of card status for a given calendar day (Annex 1C requirement 105, 106, 107) and to slots status at 00:00 that day.
recordType denotes the type of the record (ActivityChangeInfo). Value Assignment: See RecordType
recordSize is the size of the ActivityChangeInfo in bytes.
noOfRecords is the number of records in the set records.
records is the set of ActivityChangeInfo words stored in the VU for the day. It always includes two ActivityChangeInfo words giving the status of the two slots at 00:00 that day.
Type approval number of the vehicle unit.
Generation 1:
Value assignment: Unspecified.
Generation 2:
Value assignment:
The approval number shall be provided as published on the corresponding European Commission web site, i.e. for example including hyphens if any. The approval number shall be left-aligned.
Generation 1:
Information, stored in a vehicle unit, related to the calibrations of the recording equipment (Annex 1B requirement 098).
noOfVuCalibrationRecords is the number of records contained in the vuCalibrationRecords set.
vuCalibrationRecords is the set of calibration records.
Information, stored in a vehicle unit, related a calibration of the recording equipment (Annex 1B requirement 098 and Annex 1C requirement 119 and 120).
Generation 1:
calibrationPurpose is the purpose of the calibration.
workshopName, workshopAddress are the workshop name and address.
workshopCardNumber identifies the workshop card used during the calibration.
workshopCardExpiryDate is the card expiry date.
vehicleIdentificationNumber is the VIN.
vehicleRegistrationIdentification contains the VRN and registering Member State.
wVehicleCharacteristicConstant is the characteristic coefficient of the vehicle.
kConstantOfRecordingEquipment is the constant of the recording equipment.
lTyreCircumference is the effective circumference of the wheel tyres.
tyreSize is the designation of the dimension of the tyres mounted on the vehicle
authorisedSpeed is the authorised speed of the vehicle.
oldOdometerValue, newOdometerValue are the old and new values of the odometer.
oldTimeValue, newTimeValue are the old and new values of date and time.
nextCalibrationDate is the date of the next calibration of the type specified in CalibrationPurpose to be carried out by the authorised inspection authority.
Generation 2:
In addition to generation 1 the following data element is used:
sealDataVu gives information about the seals that are attached to different components of the vehicle.
Generation 2:
Information, stored in a vehicle unit, related to the calibrations of the recording equipment (Annex 1C requirement 119 and 120).
recordType denotes the type of the record (VuCalibrationRecord). Value Assignment: See RecordType
recordSize is the size of the VuCalibrationRecord in bytes.
noOfRecords is the number of records in the set records.
records is the set of calibration records.
Generation 1:
Information, stored in a vehicle unit, related to insertion and withdrawal cycles of driver cards or of workshop cards in the vehicle unit (Annex 1B requirement 081 and Annex 1C requirement 103).
noOfIWRecords is the number of records in the set vuCardIWRecords.
vuCardIWRecords is a set of records related to card insertion withdrawal cycles.
Information, stored in a vehicle unit, related to an insertion and withdrawal cycle of a driver card or of a workshop card in the vehicle unit (Annex 1B requirement 081 and Annex 1C requirement 102).
Generation 1:
cardHolderName is the driver or workshop card holder's surname and first names as stored in the card.
fullCardNumber is the type of card, its issuing Member State and its card number as stored in the card.
cardExpiryDate is the card's expiry date as stored in the card.
cardInsertionTime is the insertion date and time.
vehicleOdometerValueAtInsertion is the vehicle odometer value at card insertion.
cardSlotNumber is the slot in which the card is inserted.
cardWithdrawalTime is the withdrawal date and time.
vehicleOdometerValueAtWithdrawal is the vehicle odometer value at card withdrawal.
previousVehicleInfo contains information about the previous vehicle used by the driver, as stored in the card.
manualInputFlag is a flag identifying if the cardholder has manually entered driver activities at card insertion.
Generation 2:
Instead of fullCardNumber the generation 2 data structure makes use of the following data element.
fullCardNumberAndGeneration is the type of card, its issuing Member State, its card number and generation as stored in the card.
Generation 2:
Information, stored in a vehicle unit, related to insertion and withdrawal cycles of driver cards or of workshop cards in the vehicle unit (Annex 1C requirement 103).
recordType denotes the type of the record (VuCardIWRecord). Value Assignment: See RecordType
recordSize is the size of the VuCardIWRecord in bytes.
noOfRecords is the number of records in the set records.
records is a set of records related to card insertion withdrawal cycles.
Generation 2:
Information, stored in a vehicle unit, about a tachograph card used (Annex IC requirement 132).
cardNumberAndGenerationInformation is the full card number and generation of the card used (data type 2.74).
cardExtendedSerialNumber as read from the file EF_ICC under the MF of the card.
cardStructureVersion as read from the file EF_Application_Identification under the DF_Tachograph_G2.
cardNumber as read from the file EF_Identification under the DF_Tachograph_G2.]
Generation 2:
Information stored in a vehicle unit about the tachograph cards used with this VU. This information is intended for the analysis of VU — card problems (Annex 1C requirement 132).
recordType denotes the type of the record (VuCardRecord). Value Assignment: See RecordType
recordSize is the size of the VuCardRecord in bytes.
noOfRecords is the number of records in the set records.
records is a set of records related to the tachograph cards used with the VU.
Certificate of the public key of a vehicle unit.
Generation 2:
The VU certificate plus metadata as used in the download protocol.
recordType denotes the type of the record (VuCertificate). Value Assignment: See RecordType
recordSize is the size of the VuCertificate in bytes.
noOfRecords is the number of records in the set records. The value shall be set to 1 as the certificates may have different lengths.
records is a set of VU certificates.
Generation 1:
Information, stored in a vehicle unit, related to company locks (Annex 1B requirement 104).
noOfLocks is the number of locks listed in vuCompanyLocksRecords.
vuCompanyLocksRecords is the set of company locks records.
Information, stored in a vehicle unit, related to one company lock (Annex 1B requirement 104 and Annex 1C requirement 128).
Generation 1:
lockInTime, lockOutTime are the date and time of lock-in and lock-out.
companyName, companyAddress are the company name and address related with the lock-in.
companyCardNumber identifies the card used at lock-in.
Generation 2:
Instead of companyCardNumber the generation 2 data structure makes use of the following data element.
companyCardNumberAndGeneration identifies the card including its generation used at lock-in.
Generation 2:
Information, stored in a vehicle unit, related to company locks (Annex 1C requirement 128).
recordType denotes the type of the record (VuCompanyLocksRecord). Value Assignment: See RecordType
recordSize is the size of the VuCompanyLocksRecord in bytes.
noOfRecords is the number of records in the set records. Value 0..255.
records is the set of company locks records.
Generation 1:
Information, stored in a vehicle unit, related to controls performed using this VU (Annex 1B requirement 102).
noOfControls is the number of controls listed in vuControlActivityRecords.
vuControlActivityRecords is the set of control activity records.
Information, stored in a vehicle unit, related to a control performed using this VU (Annex 1B requirement 102 and Annex 1C requirement 126).
Generation 1:
controlType is the type of the control.
controlTime is the date and time of the control.
controlCardNumber identifies the control card used for the control.
downloadPeriodBeginTime is the begin time of the downloaded period, in case of downloading.
downloadPeriodEndTime is the end time of the downloaded period, in case of downloading.
Generation 2:
Instead of controlCardNumber the generation 2 data structure makes use of the following data element.
controlCardNumberAndGeneration identifies the control card including its generation used for the control.
Generation 2:
Information, stored in a vehicle unit, related to controls performed using this VU (Annex 1C requirement 126).
recordType denotes the type of the record (VuControlActivityRecord). Value Assignment: See RecordType
recordSize is the size of the VuControlActivityRecord in bytes.
noOfRecords is the number of records in the set records.
records is the set of VU control activity records.
Counter, stored in a card, identifying sequentially the insertion withdrawal cycles of the card in vehicle units.
Value assignment: Consecutive Number with max, value 9 999, starting again with 0.
Information, stored in a vehicle unit, related to the vehicle's detailed speed for a minute during which the vehicle has been moving (Annnex 1B requirement 093 and Annex 1C requirement 116).
speedBlockBeginDate is the date and time of the first speed value within the block.
speedsPerSecond is the chronological sequence of measured speeds every seconds for the minute starting at speedBlockBeginDate (included).
Generation 2:
Information, stored in a vehicle unit, related to the detailed speed of the vehicle.
recordType denotes the type of the record (VuDetailedSpeedBlock). Value Assignment: See RecordType
recordSize is the size of the VuDetailedSpeedBlock in bytes.
noOfRecords is the number of records in the set records.
records is the set of detailed speed blocks.
Generation 1:
Information, stored in a vehicle unit, related to the detailed speed of the vehicle.
noOfSpeedBlocks is the number of speed blocks in the vuDetailedSpeedBlocks set.
vuDetailedSpeedBlocks is the set of detailed speed blocks.
Oldest and latest dates for which a vehicle unit holds data related to drivers activities (Annex 1B requirements 081, 084 or 087 and Annex 1C requirements 102, 105, 108).
minDownloadableTime is the oldest card insertion or activity change or place entry date and time stored in the VU.
maxDownloadableTime is the latest card withdrawal or activity change or place entry date and time stored in the VU.
Generation 2:
The VUDownloadablePeriod plus metadata used in the download protocol.
recordType denotes the type of the record (VuDownloadablePeriod). Value Assignment: See RecordType
recordSize is the size of the VuDownloadablePeriod in bytes.
noOfRecords is the number of records in the set records.
records is the set of VuDownloadablePeriod records.
Information, stored in a vehicle unit, related to its last download (Annex 1B requirement 105 and Annex 1C requirement 129).
Generation 1:
downloadingTime is the date and time of downloading.
fullCardNumber identifies the card used to authorise the download.
companyOrWorkshopName is the company or workshop name.
Generation 2:
Instead of fullCardNumber the generation 2 data structure makes use of the following data element.
fullCardNumberAndGeneration identifies the card including its generation used to authorise the download.
Generation 2:
Information related to the last VU download (Annex 1C requirement 129).
recordType denotes the type of the record (VuDownloadActivityData). Value Assignment: See RecordType
recordSize is the size of the VuDownloadActivityData in bytes.
noOfRecords is the number of records in the set records.
records is the set of download activity data records.
Generation 1:
Information, stored in a vehicle unit, related to events (Annex 1B requirement 094 except over speeding event).
noOfVuEvents is the number of events listed in the vuEventRecords set.
vuEventRecords is a set of events records.
Information, stored in a vehicle unit, related to an event (Annex 1B requirement 094 and Annex 1C requirement 117 except over speeding event).
Generation 1:
eventType is the type of the event.
eventRecordPurpose is the purpose for which this event has been recorded.
eventBeginTime is the date and time of beginning of event.
eventEndTime is the date and time of end of event.
cardNumberDriverSlotBegin identifies the card inserted in the driver slot at the beginning of the event.
cardNumberCodriverSlotBegin identifies the card inserted in the co-driver slot at the beginning of the event.
cardNumberDriverSlotEnd identifies the card inserted in the driver slot at the end of the event.
cardNumberCodriverSlotEnd identifies the card inserted in the co-driver slot at the end of the event.
similarEventsNumber is the number of similar events that day.
This sequence can be used for all events other than over speeding events.
Generation 2:
In addition to generation 1 the following data elements are used:
manufacturerSpecificEventFaultData contains additional, manufacturer specific information about the event.
Instead of cardNumberDriverSlotBegin, cardNumberCodriverSlotBegin, cardNumberDriverSlotEnd, and cardNumberCodriverSlotEnd the generation 2 data structure makes use of the following data elements:
cardNumberAndGenDriverSlotBegin identifies the card including its generation which is inserted in the driver slot at the beginning of the event.
cardNumberAndGenCodriverSlotBegin identifies the card including its generation which is inserted in the co-driver slot at the beginning of the event.
cardNumberAndGenDriverSlotEnd identifies the card including its generation which is inserted in the driver slot at the end of the event.
cardNumberAndGenCodriverSlotEnd identifies the card including its generation which is inserted in the co-driver slot at the end of the event.
If the event is a time conflict the eventBeginTime and eventEndTime are to be interpreted as follows:
eventBeginTime is the recording equipment date and time.
eventEndTime is the GNSS date and time.
Generation 2:
Information, stored in a vehicle unit, related to events (Annex 1C requirement 117 except over speeding event).
recordType denotes the type of the record (VuEventRecord). Value Assignment: See RecordType
recordSize is the size of the VuEventRecord in bytes.
noOfRecords is the number of records in the set records.
records is a set of events records.
Generation 1:
Information, stored in a vehicle unit, related to faults (Annex 1B requirement 096).
noOfVuFaults is the number of faults listed in the vuFaultRecords set.
vuFaultRecords is a set of faults records.
Information, stored in a vehicle unit, related to a fault (Annex 1B requirement 096 and Annex 1C requirement 118).
Generation 1:
faultType is the type of recording equipment fault.
faultRecordPurpose is the purpose for which this fault has been recorded.
faultBeginTime is the date and time of beginning of fault.
faultEndTime is the date and time of end of fault.
cardNumberDriverSlotBegin identifies the card inserted in the driver slot at the beginning of the fault.
cardNumberCodriverSlotBegin identifies the card inserted in the co-driver slot at the beginning of the fault.
cardNumberDriverSlotEnd identifies the card inserted in the driver slot at the end of the fault.
cardNumberCodriverSlotEnd identifies the card inserted in the co-driver slot at the end of the fault.
Generation 2:
In addition to generation 1 the following data element is used:
manufacturerSpecificEventFaultData contains additional, manufacturer specific information about the fault.
Instead of cardNumberDriverSlotBegin, cardNumberCodriverSlotBegin, cardNumberDriverSlotEnd, and cardNumberCodriverSlotEnd the generation 2 data structure makes use of the following data elements:
cardNumberAndGenDriverSlotBegin identifies the card including its generation which is inserted in the driver slot at the beginning of the fault.
cardNumberAndGenCodriverSlotBegin identifies the card including its generation which is inserted in the co-driver slot at the beginning of the fault.
cardNumberAndGenDriverSlotEnd identifies the card including its generation which is inserted in the driver slot at the end of the fault.
cardNumberAndGenCodriverSlotEnd identifies the card including its generation which is inserted in the co-driver slot at the end of the fault.
Generation 2:
Information, stored in a vehicle unit, related to faults (Annex 1C requirement 118).
recordType denotes the type of the record (VuFaultRecord). Value Assignment: See RecordType
recordSize is the size of the VuFaultRecord in bytes.
noOfRecords is the number of records in the set records.
records is a set of faults records.
Generation 2:
Information, stored in a vehicle unit, related to the GNSS position of the vehicle if the accumulated driving time reaches a multiple of three hours (Annex IC requirement 108, 110).
timeStamp is the date and time when the accumulated driving time reaches a multiple of three hours.
cardNumberAndGenDriverSlot identifies the card including its generation which is inserted in the driver slot.
cardNumberAndGenCodriverSlot identifies the card including its generation which is inserted in the co-driver slot.
gnssPlaceRecord contains information related to the position of the vehicle.
vehicleOdometerValue is the odometer value when the accumulated driving time reaches a multiple of three hours.
Generation 2:
Information, stored in a vehicle unit, related to the GNSS position of the vehicle if the accumulated driving time reaches a multiple of three hours (Annex IC requirement 108 and 110).
recordType denotes the type of the record (VuGNSSADRecord).
Value Assignment : See RecordType.
recordSize is the size of the VuGNSSADRecord in bytes.
noOfRecords is the number of records in the set records.
records is a set of GNSS accumulated driving records.]
Information, stored in a vehicle unit, related to the identification of the vehicle unit (Annex 1B requirement 075 and Annex 1C requirement 93 and 121).
Generation 1:
vuManufacturerName is the name of the manufacturer of the vehicle unit.
vuManufacturerAddress is the address of the manufacturer of the vehicle unit.
vuPartNumber is the part number of the vehicle unit.
vuSerialNumber is the serial number of the vehicle unit.
vuSoftwareIdentification identifies the software implemented in the vehicle unit.
vuManufacturingDate is the manufacturing date of the vehicle unit.
vuApprovalNumber is the type approval number of the vehicle unit.
Generation 2:
In addition to generation 1 the following data element are used:
vuGeneration identifies the generation of the vehicle unit.
vuAbility provides information whether the VU supports generation 1 tachograph cards or not.
Generation 2:
The VuIdentification plus metadata used in the download protocol.
recordType denotes the type of the record (VuIdentification). Value Assignment: See RecordType
recordSize is the size of the VuIdentification in bytes.
noOfRecords is the number of records in the set records.
records is a set of VuIdentification records.
Generation 2:
Information stored in a vehicle unit, related to the consent of a driver to use Intelligent Transport Systems.
cardNumberAndGen identifies the card including its generation. This must be a driver card or a workshop card.
consent is a flag which indicates whether the driver has given his consent on the usage of Intelligent Transport Systems with this vehicle / vehicle unit.
Value assignment:
indicates the driver's consent to use Intelligent Transport Systems
indicates the driver's denial to use Intelligent Transport Systems
Generation 2:
Information, stored in a vehicle unit, related to drivers' consent on the usage of Intelligent Transport Systems (Annex 1C requirement 200).
recordType denotes the type of the record (VuITSConsentRecord). Value Assignment: See RecordType
recordSize is the size of the VuITSConsentRecord in bytes.
noOfRecords is the number of records in the set records.
records is the set of ITS consent records.
Address of the manufacturer of the vehicle unit.
Value assignment: Unspecified.
Name of the manufacturer of the vehicle unit.
Value assignment: Unspecified.
Date of manufacture of the vehicle unit.
Value assignment: Unspecified.
Information, stored in a vehicle unit, related to over speeding events since the last over speeding control (Annex 1B requirement 095 and Annex 1C requirement 117).
lastOverspeedControlTime is the date and time of the last over speeding control.
firstOverspeedSince is the date and time of the first over speeding following this over speeding control.
numberOfOverspeedSince is the number of over speeding events since the last over speeding control.
Generation 2:
The VuOverSpeedingControlData plus metadata used in the download protocol.
recordType denotes the type of the record (VuOverSpeedingControlData). Value Assignment: See RecordType
recordSize is the size of the VuOverSpeedingControlData in bytes.
noOfRecords is the number of records in the set records.
records is a set of over speeding control data records.
Generation 1:
Information, stored in a vehicle unit, related to over speeding events (Annex 1B requirement 094).
noOfVuOverSpeedingEvents is the number of events listed in the vuOverSpeedingEventRecords set.
vuOverSpeedingEventRecords is a set of over speeding events records.
Generation 1:
Information, stored in a vehicle unit, related to over speeding events (Annex 1B requirement 094 and Annex 1C requirement 117).
eventType is the type of the event.
eventRecordPurpose is the purpose for which this event has been recorded.
eventBeginTime is the date and time of beginning of event.
eventEndTime is the date and time of end of event.
maxSpeedValue is the maximum speed measured during the event.
averageSpeedValue is the arithmetic average speed measured during the event.
cardNumberDriverSlotBegin identifies the card inserted in the driver slot at the beginning of the event.
similarEventsNumber is the number of similar events that day.
Generation 2:
Information, stored in a vehicle unit, related to over speeding events (Annex 1B requirement 094 and Annex 1C requirement 117).
Instead of cardNumberDriverSlotBegin, the generation 2 data structure makes use of the following data element:
cardNumberAndGenDriverSlotBegin identifies the card including its generation which is inserted in the driver slot at the beginning of the event.
Generation 2:
Information, stored in a vehicle unit, related to over speeding events (Annex 1C requirement 117).
recordType denotes the type of the record (VuOverSpeedingEventRecord). Value Assignment: See RecordType
recordSize is the size of the VuOverSpeedingEventRecord in bytes.
noOfRecords is the number of records in the set records.
records is a set of over speeding events records.
Part number of the vehicle unit.
Value assignment: VU manufacturer specific.
Generation 1:
Information, stored in a vehicle unit, related to places where drivers begin or end a daily work period (Annex 1B requirement 087 and Annex 1C requirement 108 and 110).
noOfPlaceRecords is the number of records listed in the vuPlaceDailyWorkPeriodRecords set.
vuPlaceDailyWorkPeriodRecords is a set of place related records.
Generation 1:
Information, stored in a vehicle unit, related to a place where a driver begins or ends a daily work period (Annex 1B requirement 087 and Annex 1C requirement 108 and 110).
fullCardNumber is the driver's card type, card issuing Member State and card number.
placeRecord contains the information related to the place entered.
Generation 2:
Information, stored in a vehicle unit, related to a place where a driver begins or ends a daily work period (Annex 1B requirement 087 and Annex 1C requirement 108 and 110).
Instead of fullCardNumber, the generation 2 data structure makes use of the following data element:
fullCardNumberAndGeneration is the type of card, its issuing Member State, its card number and generation as stored in the card.
Generation 2:
Information, stored in a vehicle unit, related to places where drivers begin or end a daily work period (Annex 1C requirement 108 and 110).
recordType denotes the type of the record (VuPlaceDailyWorkPeriodRecord). Value Assignment: See RecordType
recordSize is the size of the VuPlaceDailyWorkPeriodRecord in bytes.
noOfRecords is the number of records in the set records.
records is a set of place related records.
Generation 1:
The private key of a vehicle unit.
Generation 1:
The public key of a vehicle unit.
Serial number of the vehicle unit (Annex 1B requirement 075 and Annex 1C requirement 93).
Date of installation of the vehicle unit software version.
Value assignment: Unspecified.
Information, stored in a vehicle unit, related to the software installed.
vuSoftwareVersion is the software version number of the Vehicle Unit.
vuSoftInstallationDate is the software version installation date.
Software version number of the vehicle unit.
Value assignment: Unspecified.
Generation 1:
Information, stored in a vehicle unit, related to specific conditions.
noOfSpecificConditionRecords is the number of records listed in the specificConditionRecords set.
specificConditionRecords is a set of specific conditions related records.
Generation 2:
Information, stored in a vehicle unit, related to specific conditions (Annex 1C requirement 130).
recordType denotes the type of the record (SpecificConditionRecord). Value Assignment: See RecordType
recordSize is the size of the SpecificConditionRecord in bytes.
noOfRecords is the number of records in the set records.
records is a set of specific conditions related records.
Generation 1:
Information, stored in a vehicle unit, related to time adjustments performed outside the frame of a regular calibration (Annex 1B requirement 101).
noOfVuTimeAdjRecords is the number of records in vuTimeAdjustmentRecords.
vuTimeAdjustmentRecords is a set of time adjustment records.
Information, stored in a vehicle unit, related a time adjustment performed outside the frame of a regular calibration (Annex 1B requirement 101 and Annex 1C requirement 124 and 125).
Generation 1:
oldTimeValue, newTimeValue are the old and new values of date and time.
workshopName, workshopAddress are the workshop name and address.
workshopCardNumber identifies the workshop card used to perform the time adjustment.
Generation 2:
Instead of workshopCardNumber the generation 2 data structure makes use of the following data element.
workshopCardNumberAndGeneration identifies the workshop card including its generation used to perform the time adjustment.
Generation 2:
Information, stored in a vehicle unit, related to time adjustments performed outside the frame of a regular calibration (Annex 1C requirement 124 and 125).
recordType denotes the type of the record (VuTimeAdjustmentRecord). Value Assignment: See RecordType
recordSize is the size of the VuTimeAdjustmentRecord in bytes.
noOfRecords is the number of records in the set records.
records is a set of time adjustment records.
Information, stored in a workshop card related to the identification of the application of the card (Annex 1C requirement 307 and 330).
Generation 1:
typeOfTachographCardId is specifying the implemented type of card.
cardStructureVersion is specifying the the version of the structure that is implemented in the card.
noOfEventsPerType is the number of events per type of event the card can record.
noOfFaultsPerType is the number of faults per type of fault the card can record.
activityStructureLength indicates the number of bytes available for storing activity records.
noOfCardVehicleRecords is the number of vehicle records the card can contain.
noOfCardPlaceRecords is the number of places the card can record.
noOfCalibrationRecords is the number of calibration records the card can store.
Generation 2:
[F2In addition to generation 1 the following data elements are used:
noOfGNSSADRecords is the number of GNSS accumulated driving records the card can store.
noOfSpecificConditionRecords is the number of specific condition records the card can store.
noOfCardVehicleUnitRecords is the number of vehicle units used records the card can store.]
Information, stored in a workshop card, related to workshop activity performed with the card (Annex 1C requirements 314, 316, 337, and 339).
calibrationTotalNumber is the total number of calibrations performed with the card.
calibrationPointerNewestRecord is the index of the last updated calibration record.
Value assignment: Number corresponding to the numerator of the calibration record, beginning with ‘0’ for the first occurrence of the calibration records in the structure.
calibrationRecords is the set of records containing calibration and/or time adjustment information.
Information, stored in a workshop card, related to a calibration performed with the card (Annex 1C requirement 314 and 337).
Generation 1:
calibrationPurpose is the purpose of the calibration.
vehicleIdentificationNumber is the VIN.
vehicleRegistration contains the VRN and registering Member State.
wVehicleCharacteristicConstant is the characteristic coefficient of the vehicle.
kConstantOfRecordingEquipment is the constant of the recording equipment.
lTyreCircumference is the effective circumference of the wheel tyres.
tyreSize is the designation of the dimensions of the tyres mounted on the vehicle.
authorisedSpeed is the maximum authorised speed of the vehicle.
oldOdometerValue, newOdometerValue are the old and new values of the odometer.
oldTimeValue, newTimeValue are the old and new values of date and time.
nextCalibrationDate is the date of the next calibration of the type specified in CalibrationPurpose to be carried out by the authorised inspection authority.
vuPartNumber, vuSerialNumber and sensorSerialNumber are the data elements for recording equipment identification.
Generation 2:
In addition to generation 1 the following data elements are used:
sensorGNSSSerialNumber which identifies an external GNSS facility.
rcmSerialNumber which identifies a Remote Communication Module.
sealDataCard gives information about the seals that are attached to different components of the vehicle.
Information, stored in a workshop card, related to the identification of the cardholder (Annex 1C requirement 311 and 334).
workshopName is name of the workshop of the card holder.
workshopAddress is the address of the workshop of the card holder.
cardHolderName is the name and first name(s) of the holder (e.g. the name of the mechanic).
cardHolderPreferredLanguage is the preferred language of the card holder.
Personal identification number of the Workshop Card (Annex 1C requirement 309 and 332).
Value assignment: The PIN known to the cardholder, right padded with ‘FF’ bytes up to 8 bytes.
Characteristic coefficient of the vehicle (definition k)).
Value assignment: Impulses per kilometer in the operating range 0 to 64 255 pulses/km.
Generation 2:
Information, stored in a vehicle unit, related to Power Supply Interruption events (Annex 1C requirement 117).
eventType is the type of the event.
eventRecordPurpose is the purpose for which this event has been recorded.
eventBeginTime is the date and time of beginning of event.
eventEndTime is the date and time of end of event.
cardNumberAndGenDriverSlotBegin identifies the card including its generation inserted in the driver slot at the beginning of the event.
cardNumberAndGenDriverSlotEnd identifies the card including its generation inserted in the driver slot at the end of the event.
cardNumberAndGenCodriverSlotBegin identifies the card including its generation inserted in the co-driver slot at the beginning of the event.
cardNumberAndGenCodriverSlotEnd identifies the card including its generation inserted in the co-driver slot at the end of the event.
similarEventsNumber is the number of similar events that day.
Generation 2:
Information, stored in a vehicle unit, related to Power Supply Interruption events (Annex 1C requirement 117).
recordType denotes the type of the record (VuPowerSupplyInterruptionRecord). Value Assignment: See RecordType
recordSize is the size of the VuPowerSupplyInterruptionRecord in bytes.
noOfRecords is the number of records in the set records.
records is a set of power supply interruption events records.
Generation 2:
A set of SensorExternalGNSSCoupledRecord plus metadata used in the download protocol.
recordType denotes the type of the record (SensorExternalGNSSCoupledRecord). Value Assignment: See RecordType
recordSize is the size of the SensorExternalGNSSCoupledRecord in bytes.
noOfRecords is the number of records in the set records.
records is a set of Sensor External GNSS Coupled records.
Generation 2:
A set of SensorPairedRecord plus metadata used in the download protocol.
recordType denotes the type of the record (SensorPairedRecord). Value Assignment: See RecordType
recordSize is the size of the SensorPairedRecord in bytes.
noOfRecords is the number of records in the set records.
records is a set of sensor paired records.
Definition of variable values used for definitions in paragraph 2.
IA5Strings use the ASCII characters as defined by ISO/IEC 8824-1. For readability and for easy referencing the value assignment is given below. The ISO/IEC 8824-1 supersedes this informative note in case of discrepancy.
| Other character strings (Address, Name, VehicleRegistrationNumber) use, in addition, characters from the decimal character code range 161 — 255 of the following 8-bit, standard character sets, specified by the Code Page number:Standard Character Set | Code Page(Decimal) |
|---|---|
| ISO/IEC 8859-1 Latin-1 Western European | 1 |
| ISO/IEC 8859-2 Latin-2 Central European | 2 |
| ISO/IEC 8859-3 Latin-3 South European | 3 |
| ISO/IEC 8859-5 Latin / Cyrillic | 5 |
| ISO/IEC 8859-7 Latin / Greek | 7 |
| ISO/IEC 8859-9 Latin-5 Turkish | 9 |
| ISO/IEC 8859-13 Latin-7 Baltic Rim | 13 |
| ISO/IEC 8859-15 Latin-9 | 15 |
| ISO/IEC 8859-16 Latin-10 South Eastern European | 16 |
| KOI8-R Latin / Cyrillic | 80 |
| KOI8-U Latin / Cyrillic | 85 |
When encoded with ASN.1 encoding rules, all data types defined shall be encoded according to ISO/IEC 8825-2, aligned variant.
The Object Identifiers (OIDs) listed in this chapter are only relevant for generation 2. These OIDs are specified in TR-03110-3 and repeated here for the sake of completeness. These OIDs are contained in the subtree of bsi-de:
Example: Suppose VU Authentication is to be done with SHA-384, then the object identifier to use is (in ASN.1 notation) . The value of this object identifier in dot notation is
.
Example: Suppose Chip Authentication is to be done by using the ECDH algorithm, resulting in an AES session key length of 128 bits. This session key will subsequently be used in the CBC mode of operation to ensure data confidentiality and with the CMAC algorithm to ensure data authenticity. Therefore, the object identifier to use is (in ASN.1 notation) . The value of this object identifier in dot notation is
.
Generation 2:
The Application Identifier (AID) for the External GNSS Facility (Generation 2) is given by ‘FF 44 54 45 47 4D’. This is a proprietary AID according to ISO/IEC 7816-4.
Note: The last 5 bytes encode DTEGM for smart Tachograph External GNSS Facility.U.K.
The Application Identifier for the generation 2 tachograph card application is given by ‘FF 53 4D 52 44 54’. This is a proprietary AID according to ISO/IEC 7816-4.
For the purpose of this appendix, the following abbreviations apply.
Access conditions
Advanced Encryption Standard
Application Identifier
Always
Application Protocol Data Unit (structure of a command)
Answer To Reset
Authenticated.
Contacts No 6 and 7 of the card as described in ISO/IEC 7816-2
clock cycles
Certificate Holder Authorisation]
Card holder Verification Information
Class byte of an APDU command
Data Object]
Dedicated Short Range Communication
Dedicated File. A DF can contain other files (EF or DF)
Elliptic Curve Cryptography
Elementary File
elementary time unit
Generation 1
Generation 2
Integrated Circuit
Integrated Circuit Card
Identifier
Interface Device
Information Field Size
Information Field Size for the card
Information Field Size Device (for the Terminal)
Instruction byte of an APDU command
Length of the input data for a APDU command
Length of the expected data (output data for a command)
Master File (root DF)
Node Address used in T=1 protocol
Never
Parameter bytes
Personal Identification Number
Protected with secure messaging
Protocol Transmission Selection
Reserved for Future Use
Reset (of the card)
Short EF Identifier
Secure Messaging
Status bytes
Initial ATR character
Programming Voltage
Vehicle Unit
Value XX in hexadecimal notation
Value XX in hexadecimal notation
Concatenation symbol 03||04=0304
The following references are used in this Appendix:
Identification cards — Integrated circuit cards — Part 2: Dimensions and location of the contacts. ISO/IEC 7816-2:2007.
Identification cards — Integrated circuit cards — Part 3: Electrical interface and transmission protocols. ISO/IEC 7816-3:2006.
Identification cards — Integrated circuit cards — Part 4: Organization, security and commands for interchange. ISO/IEC 7816-4:2013 + Cor 1: 2014.
Identification cards — Integrated circuit cards — Part 6: Interindustry data elements for interchange. ISO/IEC 7816-6:2004 + Cor 1: 2006.
Identification cards — Integrated circuit cards — Part 8: Commands for security operations. ISO/IEC 7816-8:2004.
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function. ISO/IEC 9797-2:2011
Voltage selection shall be performed according to ISO/IEC 7816-3.
| Low | High | ||
|---|---|---|---|
| Bit 3 | Bit 2 | Bit 1 | |
| 0 | 0 | 1 | Clockstop allowed, no preferred level |
| 0 | 1 | 1 | Clockstop allowed, high level preferred |
| 1 | 0 | 1 | Clockstop allowed, low level preferred |
| 0 | 0 | 0 | Clockstop not allowed |
| 0 | 1 | 0 | Clockstop only allowed on high level |
| 1 | 0 | 0 | Clockstop only allowed on low level |
Bits 4 to 8 are not used.
Operation state while executing commands or interfacing with Digital Unit,
Idle state at all other times; in this state all data shall be retained by the card.
This paragraph describes the minimum functionality required by Tachograph cards and VUs to ensure correct operation and interoperability.
Tachograph cards are as compliant as possible with the available ISO/IEC applicable norms (especially ISO/IEC 7816). However, commands and protocols are fully described in order to specify some restricted usage or some differences if they exist. The commands specified are fully compliant with the referred norms except where indicated.
The following restrictions apply to the protocols:
The interface device shall support an answer on I/O after the rising edge of the signal on RST from 400 cc.
The interface device shall be able to read characters separated with 12 etu.
The interface device shall read an erroneous character and its repetition if separated with 13 etu. If an erroneous character is detected, the Error signal on I/O can occur between 1 etu and 2 etu. The device shall support a 1 etu delay.
The interface device shall accept a 33 bytes ATR (TS+32)
If TC1 is present in the ATR, the Extra Guard Time shall be present for characters sent by the interface device although characters sent by the card can still be separated with 12 etu. This is also true for the ACK character sent by the card after a P3 character emitted by the interface device.
The interface device shall take into account a NUL character emitted by the card.
The interface device shall accept the complementary mode for ACK.
The get-response command cannot be used in chaining mode to get a data which length could exceed 255 bytes.
NAD byte: not used (NAD shall be set to ‘00’).
S-block ABORT: not used.
S-block VPP state error: not used.
The total chaining length for a data field will not exceed 255 bytes (to be ensured by the IFD).
The Information Field Size Device (IFSD) shall be indicated by the IFD immediately after the ATR: the IFD shall transmit the S-Block IFS request after the ATR and the card shall send back S-Block IFS. The recommended value for IFSD is 254 bytes.
The card will not ask for an IFS readjustment.
Example of Basic Biprotocol ATR according to ISO/IEC 7816-3
| Character | Value | Remarks |
|---|---|---|
| TS | ‘3Bh’ | Indicates direct convention. |
| T0 | ‘85h’ | TD1 present; 5 historical bytes are presents. |
| TD1 | ‘80h’ | TD2 present; T=0 to be used |
| TD2 | ‘11h’ | TA3 present; T=1 to be used |
| TA3 | ‘XXh’ (at least ‘F0h’) | Information Field Size Card ( IFSC) |
| TH1 to TH5 | ‘XXh’ | Historical characters |
| TCK | ‘XXh’ | Check Character (exclusive OR) |
The PTS can be used, as indicated in ISO/IEC 7816-3, to switch to higher baud rates than the default one proposed by the card in the ATR if any (TA(1) byte).
Higher baud rates are optional for the card.
Examples of basic PTS for protocol selection are the following:
| Character | Value | Remarks |
|---|---|---|
| PPSS | ‘FFh’ | The Initiate Character. |
| PPS0 | ‘00h’ or ‘01h’ | PPS1 to PPS3 are not present; ‘00h’ to select T0, ‘01h’ to select T1. |
| PK | ‘XXh’ | Check Character : ‘XXh’ = ‘FFh’ if PPS0 = ‘00h’, ‘XXh’ = ‘FEh’ if PPS0 = ‘01h’. |
| Abbreviation | Meaning |
|---|---|
| ALW | The action is always possible and can be executed without any restriction. Command and response APDU are sent in plain text, i.e. without secure messaging. |
| NEV | The action is never possible. |
| PLAIN-C | The command APDU is sent in plain, i.e. without secure messaging. |
| PWD | The action may only be executed if the workshop card PIN has been successfully verified, i.e. if the card internal security status ‘PIN_Verified’ is set. The command must be sent without secure messaging. |
| EXT-AUT-G1 | The action may only be executed if the External Authenticate command for the generation 1 authentication (see also Appendix 11 Part A) has been successfully performed. |
| SM-MAC-G1 | The APDU (command and response) must be applied with generation 1 secure messaging in authentication-only mode (see Appendix 11 Part A). |
| SM-C-MAC-G1 | The command APDU must be applied with generation 1 secure messaging in authentication only mode (see Appendix 11 Part A). |
| SM-R-ENC-G1 | The response APDU must be applied with generation 1 secure messaging in encryption mode (see Appendix 11 Part A), i.e. no message authentication code is returned. |
| SM-R-ENC-MAC-G1 | The response APDU must be applied with generation 1 secure messaging in encrypt-then-authenticate mode (see Appendix 11 Part A). |
| SM-MAC-G2 | The APDU (command and response) must be applied with generation 2 secure messaging in authentication-only mode (see Appendix 11 Part B). |
| SM-C-MAC-G2 | The command APDU must be applied with generation 2 secure messaging in authentication only mode (see Appendix 11 Part B). |
| SM-R-ENC-MAC-G2 | The response APDU must be applied with generation 2 secure messaging in encrypt-then-authenticate mode (see Appendix 11 Part B). |
:
All security conditions must be fulfilled
:
At least one security condition must be fulfilled
The access rules for the file system, i.e. the SELECT, READ BINARY and UPDATE BINARY command, are specified in chapter 4. The access rules for the remaining commands are specified in the following tables. The term ‘not applicable’ is used if there is no requirement to support the command. In this case the command may or may not be supported, but the access condition is out of scope.]
| [F2Command | Driver Card | Workshop Card | Control Card | Company Card |
|---|---|---|---|---|
| External Authenticate | ||||
— For generation 1 authentication | ALW | ALW | ALW | ALW |
— For generation 2 authentication | ALW | PWD | ALW | ALW |
| Internal Authenticate | ALW | PWD | ALW | ALW |
| General Authenticate | ALW | ALW | ALW | ALW |
| Get Challenge | ALW | ALW | ALW | ALW |
| MSE:SET AT | ALW | ALW | ALW | ALW |
| MSE:SET DST | ALW | ALW | ALW | ALW |
| Process DSRC Message | Not applicable | Not applicable | Not applicable | Not applicable |
| PSO: Compute Digital Signature | ALW OR SM-MAC-G2 | ALW OR SM-MAC-G2 | Not applicable | Not applicable |
| PSO: Hash | Not applicable | Not applicable | ALW | Not applicable |
| PERFORM HASH of FILE | ALW OR SM-MAC-G2 | ALW OR SM-MAC-G2 | Not applicable | Not applicable |
| PSO: Verify Certificate | ALW | ALW | ALW | ALW |
| PSO: Verify Digital Signature | Not applicable | Not applicable | ALW | Not applicable |
| Verify | Not applicable | ALW | Not applicable | Not applicable] |
| [F2Command | Driver Card | Workshop Card | Control Card | Company Card |
|---|---|---|---|---|
| External Authenticate | ||||
— For generation 1 authentication | Not applicable | Not applicable | Not applicable | Not applicable |
— For generation 2 authentication | ALW | PWD | ALW | ALW |
| Internal Authenticate | Not applicable | Not applicable | Not applicable | Not applicable |
| General Authenticate | ALW | ALW | ALW | ALW |
| Get Challenge | ALW | ALW | ALW | ALW |
| MSE:SET AT | ALW | ALW | ALW | ALW |
| MSE:SET DST | ALW | ALW | ALW | ALW |
| Process DSRC Message | Not applicable | ALW | ALW | Not applicable |
| PSO: Compute Digital Signature | ALW OR SM-MAC-G2 | ALW OR SM-MAC-G2 | Not applicable | Not applicable |
| PSO: Hash | Not applicable | Not applicable | ALW | Not applicable |
| PERFORM HASH of FILE | ALW OR SM-MAC-G2 | ALW OR SM-MAC-G2 | Not applicable | Not applicable |
| PSO: Verify Certificate | ALW | ALW | ALW | ALW |
| PSO: Verify Digital Signature | Not applicable | Not applicable | ALW | Not applicable |
| Verify | Not applicable | ALW | Not applicable | Not applicable] |
| [F2Command | Driver Card | Workshop Card | Control Card | Company Card |
|---|---|---|---|---|
| External Authenticate | ||||
— For generation 1 authentication | Not applicable | Not applicable | Not applicable | Not applicable |
— For generation 2 authentication | ALW | PWD | ALW | ALW |
| Internal Authenticate | Not applicable | Not applicable | Not applicable | Not applicable |
| General Authenticate | ALW | ALW | ALW | ALW |
| Get Challenge | ALW | ALW | ALW | ALW |
| MSE:SET AT | ALW | ALW | ALW | ALW |
| MSE:SET DST | ALW | ALW | ALW | ALW |
| Process DSRC Message | Not applicable | Not applicable | Not applicable | Not applicable |
| PSO: Compute Digital Signature | Not applicable | Not applicable | Not applicable | Not applicable |
| PSO: Hash | Not applicable | Not applicable | Not applicable | Not applicable |
| PERFORM HASH of FILE | Not applicable | Not applicable | Not applicable | Not applicable |
| PSO: Verify Certificate | ALW | ALW | ALW | ALW |
| PSO: Verify Digital Signature | Not applicable | Not applicable | Not applicable | Not applicable |
| Verify | Not applicable | ALW | Not applicable | Not applicable] |
Note: The command descriptions provide more information on the support of the commands for the different tachograph card types and the different DFs.U.K.
Commands and file organisation are deduced from and complies with ISO/IEC 7816-4.
This section describes the following APDU command-response pairs. The command variants which are supported by a generation 1 and 2 application are specified in the corresponding command descriptions.
Additional status words as defined in ISO/IEC 7816-4 can be returned, if their behaviour is not explicitly mentioned in this appendix.
For example the following status words can be optionally returned:
6881: Logical channel not supported
6882: Secure messaging not supported]
The mandatory commands for the Tachograph cards are described in this chapter.
Additional relevant details, related to cryptographic operations involved, are given in Appendix 11 Common security mechanisms for Tachograph Generation 1 and Generation 2.
All commands are described independently of the used protocol (T=0 or T=1). The APDU bytes CLA, INS, P1, P2, Lc and Le are always indicated. If Lc or Le is not needed for the described command, the associated length, value and description are empty.
When using protocol T=1, the card shall answer to Le=0 by sending all available output data.
When using protocol T=0, the IFD shall send the first command with P3=Lc + data, the card shall answer (to this implicit Le=0) by the Status bytes ‘61La’, where La is the number of response bytes available. The IFD shall then generate a GET RESPONSE command with P3 = La to read the data.
Indicate the extended length field support in the ATR
Provide the supported buffer sizes by means of the extended length information in the EF ATR/INFO see TCS_146.
Indicate whether it supports extended length fields for T = 1 and / or T = 0 in the EF Extended Length, see TCS_147.
Support extended length fields for the tachograph application generation 1 and 2.
All commands are specified for short length fields. The usage of extended length APDUs is clear from ISO/IEC 7816-4.U.K.
In general the commands are specified for the plain mode, i.e. without secure messaging, as the secure messaging layer is specified in Appendix 11. It is clear from the access rules for a command whether the command shall support secure messaging or not and whether the command shall support generation 1 and / or generation 2 secure messaging. Some command variants are described with secure messaging to illustrate the usage of secure messaging.U.K.
This command is compliant with ISO/IEC 7816-4, but has a restricted usage compared to the command defined in the norm.
The SELECT command is used:
to select an application DF (selection by name must be used)
to select an elementary file corresponding to the submitted file ID
This command allows selecting an application DF in the card.
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘00h’ | |
| INS | 1 | ‘A4h’ | |
| P1 | 1 | ‘04h’ | Selection by name (AID) |
| P2 | 1 | ‘0Ch’ | No response expected |
| Lc | 1 | ‘NNh’ | Number of bytes sent to the card (length of the AID): ‘06h’ for the Tachograph application |
| #6-#(5+NN) | NN | ‘XX..XXh’ | AID: ‘FF 54 41 43 48 4F’ for the Generation 1 tachograph application AID: ‘FF 53 4D 52 44 54’ for the Generation 2 tachograph application |
No response to the SELECT command is needed (Le absent in T=1, or no response asked in T=0).
| Byte | Length | Value | Description |
|---|---|---|---|
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If the command is successful, the card returns ‘9000’.
If the application corresponding with the AID is not found, the processing state returned is ‘6A82’.
In T=1, if the byte Le is present, the state returned is ‘6700’.
In T=0, if a response is asked after the SELECT command, the state returned is ‘6900’.
[F2If the selected application is considered to be corrupted (integrity error is detected within the file attributes), the processing state returned is ‘ 6400 ’ or ‘ 6500 ’.]
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘00h’ | |
| INS | 1 | ‘A4h’ | |
| P1 | 1 | ‘02h’ | Selection of an EF under the current DF |
| P2 | 1 | ‘0Ch’ | No response expected |
| Lc | 1 | ‘02h’ | Number of bytes sent to the card |
| #6-#7 | 2 | ‘XXXXh’ | File Identifier |
No response to the SELECT command is needed (Le absent in T=1, or no response asked in T=0).
| Byte | Length | Value | Description |
|---|---|---|---|
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If the command is successful, the card returns ‘9000’.
If the file corresponding with the file identifier is not found, the processing state returned is ‘6A82’.
In T=1, if the byte Le is present, the state returned is ‘6700’.
In T=0, if a response is asked after the SELECT command, the state returned is ‘6900’.
[F2If the selected file is considered to be corrupted (integrity error is detected within the file attributes), the processing state returned is ‘ 6400 ’ or ‘ 6500 ’.]
This command is compliant with ISO/IEC 7816-4, but has a restricted usage compared to the command defined in the norm.
The READ BINARY command is used to read data from a transparent file.
The response of the card consists of returning the data read, optionally encapsulated in a secure messaging structure.
This command enables the IFD to read data from the EF currently selected, without secure messaging.
Note: This command without secure messaging can only be used to read a file that supports the ALW security condition for the Read access mode.U.K.
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘00h’ | |
| INS | 1 | ‘B0h’ | Read Binary |
| P1 | 1 | ‘XXh’ | Offset in bytes from the beginning of the file: Most Significant Byte |
| P2 | 1 | ‘XXh’ | Offset in bytes from the beginning of the file: Least Significant Byte |
| Le | 1 | ‘XXh’ | Length of data expected. Number of Bytes to be read. |
Note: bit 8 of P1 must be set to 0.U.K.
| Byte | Length | Value | Description |
|---|---|---|---|
| #1-#X | X | ‘XX..XXh’ | Data read |
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If the command is successful, the card returns ‘9000’.
If no EF is selected, the processing state returned is ‘6986’.
If the security conditions of the selected file are not satisfied, the command is interrupted with ‘6982’.
If the Offset is not compatible with the size of the EF (Offset > EF size), the processing state returned is ‘6B00’.
If the size of the data to be read is not compatible with the size of the EF (Offset + Le > EF size) the processing state returned is ‘6700’ or ‘6Cxx’ where ‘xx’ indicates the exact length.
[F2If an integrity error is detected within the file attributes, the card shall consider the file as corrupted and unrecoverable, the processing state returned is ‘ 6400 ’ or ‘ 6500 ’.]
If an integrity error is detected within the stored data, the card shall return the demanded data, and the processing state returned is ‘6281’.
This command enables the IFD to read data from the EF currently selected with secure messaging, in order to verify the integrity of the data received and to protect the confidentiality of the data if the security condition SM-R-ENC-MAC-G1 (generation 1) or SM-R-ENC-MAC-G2 (generation 2) is applied.
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘0Ch’ | Secure Messaging asked |
| INS | 1 | ‘B0h’ | Read Binary |
| P1 | 1 | ‘XXh’ | P1 ( offset in bytes from the beginning of the file): Most Significant Byte |
| P2 | 1 | ‘XXh’ | P2 ( offset in bytes from the beginning of the file): Least Significant Byte |
| Lc | 1 | ‘XXh’ | Length of input data for secure messaging |
| #6 | 1 | ‘97h’ | TLE: Tag for expected length specification. |
| #7 | 1 | ‘01h’ | LLE: Length of expected length |
| #8 | 1 | ‘NNh’ | Expected length specification (original Le): Number of Bytes to be read |
| #9 | 1 | ‘8Eh’ | TCC: Tag for cryptographic checksum |
| #10 | 1 | ‘XXh’ | LCC: Length of following cryptographic checksum
|
| #11-#(10+L) | L | ‘XX..XXh’ | Cryptographic checksum |
| Le | 1 | ‘00h’ | As specified in ISO/IEC 7816-4 |
| [F2Byte | Length | Value | Description |
|---|---|---|---|
| #1 | 1 | ‘ 81h ’ | T PV : Tag for plain value data |
| #2 | L | ‘NNh’ or ‘81 NNh’ | L PV : length of returned data (=original Le). L is 2 bytes if L PV >127 bytes. |
| #(2+L) - #(1+L+NN) | NN | ‘ XX..XXh ’ | Plain Data value |
| #(2+L+NN) | 1 | ‘ 99h ’ | Tag for Processing Status (SW1-SW2) – optional for generation 1 secure messaging |
| #(3+L+NN) | 1 | ‘ 02h ’ | Length of Processing Status – optional for generation 1 secure messaging |
| #(4+L+NN) - #(5+L+NN) | 2 | ‘ XX XXh ’ | Processing Status of the unprotected response APDU – optional for generation 1 secure messaging |
| #(6+L+NN) | 1 | ‘ 8Eh ’ | TCC: Tag for cryptographic checksum |
| #(7+L+NN) | 1 | ‘ XXh ’ | LCC: Length of following cryptographic checksum
|
| #(8+L+NN)-#(7+M+L+NN) | M | ‘ XX..XXh ’ | Cryptographic checksum |
| SW | 2 | ‘ XXXXh ’ | Status Words (SW1,SW2)] |
| [F2Byte | Length | Value | Description |
|---|---|---|---|
| #1 | 1 | ‘ 87h ’ | T PI CG : Tag for encrypted data (cryptogram) |
| #2 | L | ‘MMh’ or ‘81 MMh’ | L PI CG : length of returned encrypted data (different of original Le of the command due to padding). L is 2 bytes if LPI CG > 127 bytes. |
| #(2+L)-#(1+L+MM) | MM | ‘ 01XX..XXh ’ | Encrypted Data: Padding Indicator and cryptogram |
| #(2+L+MM) | 1 | ‘ 99h ’ | Tag for Processing Status (SW1-SW2) – optional for generation 1 secure messaging |
| #(3+L+MM) | 1 | ‘ 02h ’ | Length of Processing Status – optional for generation 1 secure messaging |
| #(4+L+MM) - #(5+L+MM) | 2 | ‘ XX XXh ’ | Processing Status of the unprotected response APDU – optional for generation 1 secure messaging |
| #(6+L+MM) | 1 | ‘ 8Eh ’ | TCC: Tag for cryptographic checksum |
| #(7+L+MM) | 1 | ‘ XXh ’ | LCC: Length of following cryptographic checksum
|
| #(8+L+MM)-#(7+N+L+MM) | N | ‘ XX..XXh ’ | Cryptographic checksum |
| SW | 2 | ‘ XXXXh ’ | Status Words (SW1,SW2)] |
The READ BINARY command may return regular processing states listed in TCS_43 under Tag ‘99h’ as described in TCS_59 using the secure messaging response structure.
Additionally, some errors specifically related to secure messaging can happen. In that case, the processing state is simply returned, with no secure messaging structure involved:
| Byte | Length | Value | Description |
|---|---|---|---|
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If no current session key is available, the processing state ‘6A88’ is returned. It happens either if the session key has not already been generated or if the session key validity has expired (in this case the IFD must re-run a mutual authentication process to set a new session key).
If some expected data objects (as specified above) are missing in the secure messaging format, the processing state ‘6987’ is returned: this error happens if an expected tag is missing or if the command body is not properly constructed.
If some data objects are incorrect, the processing state returned is ‘6988’: this error happens if all the required tags are present but some lengths are different from the ones expected.
If the verification of the cryptographic checksum fails, the processing state returned is ‘6688’.
This command variant enables the IFD to select an EF by means of a short EF identifier and read data from this EF.
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘00h’ | |
| INS | 1 | ‘B0h’ | Read Binary |
| P1 | 1 | ‘XXh’ | Bit 8 is set to 1 Bit 7 and 6 are set to 00 Bit 5 — 1 encode the short EF identifier of the corresponding EF |
| P2 | 1 | ‘XXh’ | Encodes an offset from 0 to 255 bytes in the EF referenced by P1 |
| Le | 1 | ‘XXh’ | Length of data expected. Number of Bytes to be read. |
Note: The short EF identifiers used for the Generation 2 tachograph application are specified in chapter 4.U.K.
If P1 encodes a short EF identifier and the command is successful, the identified EF becomes the currently selected EF (current EF).
| Byte | Length | Value | Description |
|---|---|---|---|
| #1-#L | L | ‘XX..XXh’ | Data read |
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If the command is successful, the card returns ‘9000’.
If the file corresponding with the short EF identifier is not found, the processing state returned is ‘6A82’.
If the security conditions of the selected file are not satisfied, the command is interrupted with ‘6982’.
If the Offset is not compatible with the size of the EF (Offset > EF size), the processing state returned is ‘6B00’.
If the size of the data to be read is not compatible with the size of the EF (Offset + Le > EF size) the processing state returned is ‘6700’ or ‘6Cxx’ where ‘xx’ indicates the exact length.
[F2If an integrity error is detected within the file attributes, the card shall consider the file as corrupted and unrecoverable, the processing state returned is ‘ 6400 ’ or ‘ 6500 ’.]
If an integrity error is detected within the stored data, the card shall return the demanded data, and the processing state returned is ‘6281’.
This command variant enables the IFD to read data from an EF with 32 768 bytes or more.
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘00h’ | |
| INS | 1 | ‘B1h’ | Read Binary |
| P1 | 1 | ‘00h’ | Current EF |
| P2 | 1 | ‘00h’ | |
| Lc | 1 | ‘NNh’ | Lc Length of offset data object. |
| #6-#(5+NN) | NN | ‘XX..XXh’ | Offset data object: Tag ‘54h’ Length ‘01h’ or ‘02h’ Value offset |
| [F2Le | 1 | 'XXh' | As specified in ISO/IEC 7816-4] |
The IFD shall encode the offset data object's length with a minimum possible number of octets, i.e. using the length byte ‘01h’ the IFD shall encode an offset from 0 to 255 and using the length byte ‘02h’ an offset from ‘256’ up to ‘65 535’ bytes.
[F12In case of T = 0 the card assumes the value Le = ‘00h’ if no secure messaging is applied.
In case of T = 1 the processing state returned is ‘6700’ if Le=‘01h’.]
| Byte | Length | Value | Description |
|---|---|---|---|
| #1-#L | L | ‘XX..XXh’ | Data read encapsulated in a discretionary data object with tag ‘53h’. |
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If the command is successful, the card returns ‘9000’.
If no EF is selected, the processing state returned is ‘6986’.
If the security conditions of the selected file are not satisfied, the command is interrupted with ‘6982’.
If the Offset is not compatible with the size of the EF (Offset > EF size), the processing state returned is ‘6B00’.
If the size of the data to be read is not compatible with the size of the EF (Offset + Le > EF size) the processing state returned is ‘6700’ or ‘6Cxx’ where ‘xx’ indicates the exact length.
[F2If an integrity error is detected within the file attributes, the card shall consider the file as corrupted and unrecoverable, the processing state returned is ‘ 6400 ’ or ‘ 6500 ’.]
If an integrity error is detected within the stored data, the card shall return the demanded data, and the processing state returned is ‘6281’.
The following example illustrates the usage of secure messaging if the security condition SM-MAC-G2 applies.
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘0Ch’ | Secure Messaging asked |
| INS | 1 | ‘B1h’ | Read Binary |
| P1 | 1 | ‘00h’ | Current EF |
| P2 | 1 | ‘00h’ | |
| Lc | 1 | ‘XXh’ | Length of the secured data field |
| #6 | 1 | ‘B3h’ | Tag for plain value data encoded in BER-TLV |
| #7 | 1 | ‘NNh’ | LPV: length of transmitted data |
| #(8)-#(7+NN) | NN | ‘XX..XXh’ | Plain Data encoded in BER-TLV, i.e. the offset data object with tag ‘54’ |
| #(8+NN) | 1 | ‘97h’ | TLE: Tag for expected length specification. |
| #(9+NN) | 1 | ‘01h’ | LLE: Length of expected length |
| #(10+NN) | 1 | ‘XXh’ | Expected length specification (original Le): Number of bytes to be read |
| #(11+NN) | 1 | ‘8Eh’ | TCC: Tag for cryptographic checksum |
| #(12+NN) | 1 | ‘XXh’ | LCC: Length of following cryptographic checksum ‘08h’, ‘0Ch’ or ‘10h’ depending on AES key length for Generation 2 secure messaging (see Appendix 11 Part B) |
| #(13+NN)-#(12+M+NN) | M | ‘XX..XXh’ | Cryptographic checksum |
| Le | 1 | ‘00h’ | As specified in ISO/IEC 7816-4 |
| Byte | Length | Value | Description |
|---|---|---|---|
| #1 | 1 | ‘B3h’ | Plain Data encoded in BER-TLV |
| #2 | L | ‘NNh’ or ‘81 NNh’ | LPV: length of returned data (=original Le). L is 2 bytes if LPV>127 bytes. |
| #(2+L)-#(1+L+NN) | NN | ‘XX..XXh’ | Plain Data value encoded in BER-TLV, i.e. data read encapsulated in a discretionary data object with tag ‘53h’. |
| #(2+L+NN) | 1 | ‘99h’ | Processing Status of the unprotected response APDU |
| #(3+L+NN) | 1 | ‘02h’ | Length of Processing Status |
| #(4+L+NN) — #(5+L+NN) | 2 | ‘XX XXh’ | Processing Status of the unprotected response APDU |
| #(6+L+NN) | 1 | ‘8Eh’ | TCC: Tag for cryptographic checksum |
| #(7+L+NN) | 1 | ‘XXh’ | LCC: Length of following cryptographic checksum ‘08h’, ‘0Ch’ or ‘10h’ depending on AES key length for Generation 2 secure messaging (see Appendix 11 Part B) |
| #(8+L+NN)-#(7+M+L+NN) | M | ‘XX..XXh’ | Cryptographic checksum |
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
This command is compliant with ISO/IEC 7816-4, but has a restricted usage compared to the command defined in the norm.
The UPDATE BINARY command message initiates the update (erase + write) of the bits already present in an EF binary with the bits given in the command APDU.
This command enables the IFD to write data into the EF currently selected, without the card verifying the integrity of data received.
Note: This command without secure messaging can only be used to update a file that supports the ALW security condition for the Update access mode.U.K.
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘00h’ | |
| INS | 1 | ‘D6h’ | Update Binary |
| P1 | 1 | ‘XXh’ | Offset in bytes from the beginning of the file: Most Significant Byte |
| P2 | 1 | ‘XXh’ | Offset in bytes from the beginning of the file: Least Significant Byte |
| Lc | 1 | ‘NNh’ | Lc Length of data to Update. Number of bytes to be written. |
| #6-#(5+NN) | NN | ‘XX..XXh’ | Data to be written |
Note: bit 8 of P1 must be set to 0.U.K.
| Byte | Length | Value | Description |
|---|---|---|---|
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If the command is successful, the card returns ‘9000’.
If no EF is selected, the processing state returned is ‘6986’.
If the security conditions of the selected file are not satisfied, the command is interrupted with ‘6982’.
If the Offset is not compatible with the size of the EF (Offset > EF size), the processing state returned is ‘6B00’.
If the size of the data to be written is not compatible with the size of the EF (Offset + Lc > EF size) the processing state returned is ‘6700’.
If an integrity error is detected within the file attributes, the card shall consider the file as corrupted and unrecoverable, the processing state returned is ‘6400’ or ‘6500’.
If writing is unsuccessful, the processing state returned is ‘6581’.
This command enables the IFD to write data into the EF currently selected, with the card verifying the integrity of data received. As no confidentiality is required, the data are not encrypted.
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘0Ch’ | Secure Messaging asked |
| INS | 1 | ‘D6h’ | Update Binary |
| P1 | 1 | ‘XXh’ | Offset in bytes from the beginning of the file: Most Significant Byte |
| P2 | 1 | ‘XXh’ | Offset in bytes from the beginning of the file: Least Significant Byte |
| Lc | 1 | ‘XXh’ | Length of the secured data field |
| #6 | 1 | ‘81h’ | TPV: Tag for plain value data |
| #7 | L | ‘NNh’ or ‘81 NNh’ | LPV: length of transmitted data. L is 2 bytes if LPV > 127 bytes. |
| #(7+L)-#(6+L+NN) | NN | ‘XX..XXh’ | Plain Data value (Data to be written) |
| #(7+L+NN) | 1 | ‘8Eh’ | TCC: Tag for cryptographic checksum |
| #(8+L+NN) | 1 | ‘XXh’ | LCC: Length of following cryptographic checksum‘04h’ for Generation 1 secure messaging (see Appendix 11 Part A) ‘08h’, ‘0Ch’ or ‘10h’ depending on AES key length for Generation 2 secure messaging (see Appendix 11 Part B) |
| #(9+L+NN)-#(8+M+L+NN) | M | ‘XX..XXh’ | Cryptographic checksum |
| Le | 1 | ‘00h’ | As specified in ISO/IEC 7816-4 |
| Byte | Length | Value | Description |
|---|---|---|---|
| #1 | 1 | ‘99h’ | TSW: Tag for Status Words (to be protected by CC) |
| #2 | 1 | ‘02h’ | LSW: length of returned Status Words |
| #3-#4 | 2 | ‘XXXXh’ | Processing Status of the unprotected response APDU |
| #5 | 1 | ‘8Eh’ | TCC: Tag for cryptographic checksum |
| #6 | 1 | ‘XXh’ | LCC: Length of following cryptographic checksum
|
| #7-#(6+L) | L | ‘XX..XXh’ | Cryptographic checksum |
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
The ‘regular’ processing states, described for the UPDATE BINARY command with no secure messaging (see §3.5.3.1), can be returned using the response message structure described above.
Additionally, some errors specifically related to secure messaging can happen. In that case, the processing state is simply returned, with no secure messaging structure involved:
| Byte | Length | Value | Description |
|---|---|---|---|
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If no current session key is available, the processing state ‘6A88’ is returned.
If some expected data objects (as specified above) are missing in the secure messaging format, the processing state ‘6987’ is returned: this error happens if an expected tag is missing or if the command body is not properly constructed.
If some data objects are incorrect, the processing state returned is ‘6988’: this error happens if all the required tags are present but some lengths are different from the ones expected.
If the verification of the cryptographic checksum fails, the processing state returned is ‘6688’.
This command variant enables the IFD to select an EF by means of a short EF identifier and write data from this EF.
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘00h’ | |
| INS | 1 | ‘D6h’ | Update Binary |
| P1 | 1 | ‘XXh’ | Bit 8 is set to 1 Bit 7 and 6 are set to 00 Bit 5 — 1 encode the short EF identifier of the corresponding EF |
| P2 | 1 | ‘XXh’ | Encodes an offset from 0 to 255 bytes in the EF referenced by P1 |
| Lc | 1 | ‘NNh’ | Lc Length of data to Update. Number of bytes to be written. |
| #6-#(5+NN) | NN | ‘XX..XXh’ | Data to be written |
| Byte | Length | Value | Description |
|---|---|---|---|
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
Note: The short EF identifiers used for the generation 2 tachograph application are specified in chapter 4.U.K.
If P1 encodes a short EF identifier and the command is successful, the identified EF becomes the currently selected EF (current EF).
If the command is successful, the card returns ‘9000’.
If the file corresponding with the short EF identifier is not found, the processing state returned is ‘6A82’.
If the security conditions of the selected file are not satisfied, the command is interrupted with ‘6982’.
If the Offset is not compatible with the size of the EF (Offset > EF size), the processing state returned is ‘6B00’.
If the size of the data to be written is not compatible with the size of the EF (Offset + Lc > EF size) the processing state returned is ‘6700’.
[F2If an integrity error is detected within the file attributes, the card shall consider the file as corrupted and unrecoverable, the processing state returned is ‘ 6400 ’ or ‘ 6500 ’.]
If writing is unsuccessful, the processing state returned is ‘6581’.
This command variant enables the IFD to write data to an EF with 32 768 bytes or more.
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘00h’ | |
| INS | 1 | ‘D7h’ | Update Binary |
| P1 | 1 | ‘00h’ | Current EF |
| P2 | 1 | ‘00h’ | |
| Lc | 1 | ‘NNh’ | Lc Length of data in the command data field |
| #6-#(5+NN) | NN | ‘XX..XXh’ | Offset data object with tag ‘54h’ || Discretionary data object with tag ‘53h’ that encapsulates the data to be written |
The IFD shall encode the offset data object's and the discretionary data object's length with the minimum possible number of octets, i.e. using the length byte ‘01h’ the IFD shall encode an offset / length from 0 to 255 and using the length byte ‘02h’ an offset / length from ‘256’ up to ‘65 535’ bytes.
| Byte | Length | Value | Description |
|---|---|---|---|
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If the command is successful, the card returns ‘9000’.
If no EF is selected, the processing state returned is ‘6986’.
If the security conditions of the selected file are not satisfied, the command is interrupted with ‘6982’.
If the Offset is not compatible with the size of the EF (Offset > EF size), the processing state returned is ‘6B00’.
If the size of the data to be written is not compatible with the size of the EF (Offset + Lc > EF size) the processing state returned is ‘6700’.
If an integrity error is detected within the file attributes, the card shall consider the file as corrupted and unrecoverable, the processing state returned is ‘6400’ or ‘6500’.
If writing is unsuccessful, the processing state returned is ‘6581’.
The following example illustrates the usage of secure messaging if the security condition SM-MAC-G2 applies.
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘0Ch’ | Secure Messaging asked |
| INS | 1 | ‘D7h’ | Update Binary |
| P1 | 1 | ‘00h’ | Current EF |
| P2 | 1 | ‘00h’ | |
| Lc | 1 | ‘XXh’ | Length of the secured data field |
| #6 | 1 | ‘B3h’ | Tag for plain value data encoded in BER-TLV |
| #7 | L | ‘NNh’ or ‘81 NNh’ | LPV: length of transmitted data. L is 2 bytes if LPV > 127 bytes. |
| #(7+L)-#(6+L+NN) | NN | ‘XX..XXh’ | Plain Data encoded in BER-TLV, i.e. offset data object with tag ‘54h’ || Discretionary data object with tag ‘53h’ that encapsulates the data to be written |
| #(7+L+NN) | 1 | ‘8Eh’ | TCC: Tag for cryptographic checksum |
| #(8+L+NN) | 1 | ‘XXh’ | LCC: Length of following cryptographic checksum ‘08h’, ‘0Ch’ or ‘10h’ depending on AES key length for Generation 2 secure messaging (see Appendix 11 Part B) |
| #(9+L+NN)-#(8+M+L+NN) | M | ‘XX..XXh’ | Cryptographic checksum |
| Le | 1 | ‘00h’ | As specified in ISO/IEC 7816-4 |
| Byte | Length | Value | Description |
|---|---|---|---|
| #1 | 1 | ‘99h’ | TSW: Tag for Status Words (to be protected by CC) |
| #2 | 1 | ‘02h’ | LSW: length of returned Status Words |
| #3-#4 | 2 | ‘XXXXh’ | Processing Status of the unprotected response APDU |
| #5 | 1 | ‘8Eh’ | TCC: Tag for cryptographic checksum |
| #6 | 1 | ‘XXh’ | LCC: Length of following cryptographic checksum ‘08h’, ‘0Ch’ or ‘10h’ depending on AES key length for Generation 2 secure messaging (see Appendix 11 Part B) |
| #7-#(6+L) | L | ‘XX..XXh’ | Cryptographic checksum |
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
This command is compliant with ISO/IEC 7816-4, but has a restricted usage compared to the command defined in the norm.
The GET CHALLENGE command asks the card to issue a challenge in order to use it in a security related procedure in which a cryptogram or some ciphered data are sent to the card.
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘00h’ | |
| INS | 1 | ‘84h’ | INS |
| P1 | 1 | ‘00h’ | P1 |
| P2 | 1 | ‘00h’ | P2 |
| Le | 1 | ‘08h’ | Le (Length of Challenge expected). |
| Byte | Length | Value | Description |
|---|---|---|---|
| #1-#8 | 8 | ‘XX..XXh’ | Challenge |
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If the command is successful, the card returns ‘9000’.
If Le is different from ‘08h’, the processing state is ‘6700’.
If parameters P1-P2 are incorrect, the processing state is ‘6A86’.
This command is compliant with ISO/IEC 7816-4, but has a restricted usage compared to the command defined in the norm.
Only the workshop card is required to support this command.
Other types of tachograph cards may or may not implement this command, but for these cards no reference CHV is personalized. Therefore these cards cannot perform this commend successfully. For other types of tachograph cards than workshop cards the behavior, i.e. the error code returned, is out of the scope of this specification, if this command is sent.
The Verify command initiates the comparison in the card of the CHV (PIN) data sent from the command with the reference CHV stored in the card.
Note: Using the same reference CHV and a global security status prevents that a workshop employee must re-enter the PIN after a selection of another tachograph application DF.U.K.
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘00h’ | |
| INS | 1 | ‘20h’ | INS |
| P1 | 1 | ‘00h’ | P1 |
| P2 | 1 | ‘00h’ | P2 (the verified CHV is implicitly known) |
| Lc | 1 | ‘08h’ | Length of CHV code transmitted |
| #6-#13 | 8 | ‘XX..XXh’ | CHV |
| Byte | Length | Value | Description |
|---|---|---|---|
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If the command is successful, the card returns ‘9000’.
If the reference CHV is not found, the processing state returned is ‘6A88’.
If the CHV is blocked, (the remaining attempt counter of the CHV is null), the processing state returned is ‘6983’. Once in that state, the CHV can never be successfully presented anymore.
If the comparison is unsuccessful, the remaining attempt Counter is decreased and the status ‘63CX’ is returned (X>0 and X equals the remaining CHV attempts counter.
If the reference CHV is considered corrupted, the processing state returned is ‘6400’ or ‘6581’.
If Lc is different from ‘08h’, the processing state is ‘6700’.
This command is compliant with ISO/IEC 7816-4.
This command (only necessary and available for T=0 Protocol) is used to transmit prepared data from the card to the interface device (case where a command had included both Lc and Le).
The GET RESPONSE command has to be issued immediately after the command preparing the data, otherwise, the data are lost. After the execution of the GET RESPONSE command (except if the error ‘61xx’ or ‘6Cxx’ occur, see below), the previously prepared data are no longer available.
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘00h’ | |
| INS | 1 | ‘C0h’ | |
| P1 | 1 | ‘00h’ | |
| P2 | 1 | ‘00h’ | |
| Le | 1 | ‘XXh’ | Number of bytes expected |
| Byte | Length | Value | Description |
|---|---|---|---|
| #1-#X | X | ‘XX..XXh’ | Data |
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If the command is successful, the card returns ‘9000’.
If no data have been prepared by the card, the processing state returned is ‘6900’ or ‘6F00’.
If Le exceeds the number of available bytes or if Le is null, the processing state returned is ‘6Cxx’, where xx denotes the exact number of available bytes. In that case, the prepared data are still available for a subsequent GET RESPONSE command.
If Le is not null and is smaller than the number of available bytes, the required data are sent normally by the card, and the processing state returned is ‘61xx’, where ‘xx’ indicates a number of extra bytes still available by a subsequent GET RESPONSE command.
If the command is not supported (protocol T=1), the card returns ‘6D00’.
This command is compliant with ISO/IEC 7816-8, but has a restricted usage compared to the command defined in the norm.
The VERIFY CERTIFICATE command is used by the card to obtain a Public Key from the outside and to check its validity.
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘00h’ | |
| INS | 1 | ‘2Ah’ | Perform Security Operation |
| P1 | 1 | ‘00h’ | P1 |
| P2 | 1 | ‘AEh’ | P2: non BER-TLV coded data (concatenation of data elements) |
| Lc | 1 | ‘C2h’ | Lc: Length of the certificate, 194 bytes |
| #6-#199 | 194 | ‘XX..XXh’ | Certificate: concatenation of data elements (as described in Appendix 11) |
| Byte | Length | Value | Description |
|---|---|---|---|
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If the command is successful, the card returns ‘9000’.
If the certificate verification fails, the processing state returned is ‘6688’. The verification and unwrapping process of the certificate is described in Appendix 11 for G1 and G2.
If no Public Key is present in the Security Environment, ‘6A88’ is returned.
If the selected public key (used to unwrap the certificate) is considered corrupted, the processing state returned is ‘6400’ or ‘6581’.
Generation 1 only: If the selected public key (used to unwrap the certificate) has a CHA.LSB () different from ‘00’ (i.e. is not the one of a Member State or of Europe), the processing state returned is ‘6985’.
Depending on the curve size ECC certificates may be so long that they cannot be transmitted in a single APDU. In this case command chaining according to ISO/IEC 7816-4 must be applied and the certificate transmitted in two consecutive PSO: Verify Certificate APDUs.
The certificate structure and the domain parameters are defined in Appendix 11.
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘X0h’ | CLA byte indicating command chaining:
|
| INS | 1 | ‘2Ah’ | Perform Security Operation |
| P1 | 1 | ‘00h’ | |
| P2 | 1 | ‘BEh’ | Verify self-descriptive certificate |
| Lc | 1 | ‘XXh’ | Length of the command data field, see TCS_88 and TCS_89. |
| #6-#5+L | L | ‘XX..XXh’ | DER-TLV encoded data: ECC Certificate Body data object as first data object concatenated with the ECC Certificate Signature data object as second data object or a part of this concatenation. The tag ‘7F21’ and the corresponding length shall not be transmitted. The order of these data objects is fixed. |
Note: According to Appendix 11 the card stores the certificate or the relevant contents of the certificate and updates its currentAuthenticatedTime.U.K.
The response message structure and status words are as defined in TCS_85.
If the selected public key (used to unwrap the certificate) has a CHA.LSB (CertificateHolderAuthorisation.equipmentType) that is not suitable for the certificate verification according to Appendix 11, the processing state returned is ‘6985’.
If the currentAuthenticatedTime of the card is later than the Certificate Expiration Date, the processing state returned is ‘6985’.
If the last command of the chain is expected, the card returns ‘6883’.
If incorrect parameters are sent in the command data field, the card returns ‘6A80’ (also used in case the data objects are not sent in the specified order).
This command is compliant with ISO/IEC 7816-4.
Using the INTERNAL AUTHENTICATE command, the IFD can authenticate the card. The authentication process is described in Appendix 11. It includes the following statements:
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘00h’ | CLA |
| INS | 1 | ‘88h’ | INS |
| P1 | 1 | ‘00h’ | P1 |
| P2 | 1 | ‘00h’ | P2 |
| Lc | 1 | ‘10h’ | Length of data sent to the card |
| #6 — #13 | 8 | ‘XX..XXh’ | Challenge used to authenticate the card |
| #14 -#21 | 8 | ‘XX..XXh’ | VU.CHR (see Appendix 11) |
| Le | 1 | ‘80h’ | Length of the data expected from the card |
| Byte | Length | Value | Description |
|---|---|---|---|
| #1-#128 | 128 | ‘XX..XXh’ | Card authentication token (see Appendix 11) |
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If the command is successful, the card returns ‘9000’.
If no Public Key is present in the Security Environment, the processing state returned is ‘6A88’.
If no Private Key is present in the Security Environment, the processing state returned is ‘6A88’.
If VU.CHR does not match the current public key identifier, the processing state returned is ‘6A88’.
If the selected private key is considered corrupted, the processing state returned is ‘6400’ or ‘6581’.
This command is compliant with ISO/IEC 7816-4.
Using the EXTERNAL AUTHENTICATE command, the card can authenticate the IFD. The authentication process is described in Appendix 11 for Tachograph G1 and G2 (VU authentication).
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘00h’ | CLA |
| INS | 1 | ‘82h’ | INS |
| P1 | 1 | ‘00h’ | Keys and algorithms implicitly known |
| P2 | 1 | ‘00h’ | |
| Lc | 1 | ‘XXh’ | Lc (Length of the data sent to the card ) |
| #6-#(5+L) | L | ‘XX..XXh’ | Generation 1 authentication: Cryptogram (see Appendix 11 Part A) Generation 2 authentication: Signature generated by the IFD (see Appendix 11 Part B) |
| Byte | Length | Value | Description |
|---|---|---|---|
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If the command is successful, the card returns ‘9000’.
If the CHA of the currently set public key is not the concatenation of the Tachograph application AID and of a VU equipment Type, the processing state returned is ‘6F00’.
If the command is not immediately preceded with a GET CHALLENGE command, the processing state returned is ‘6985’.
The Generation 1 Tachograph application may return the following additional error codes:
If no Public Key is present in the Security Environment, ‘6A88’ is returned.
If no Private Key is present in the Security Environment, the processing state returned is ‘6A88’.
If the verification of the cryptogram is wrong, the processing state returned is ‘6688’.
If the selected private key is considered corrupted, the processing state returned is ‘6400’ or ‘6581’.
The command variant for the Generation 2 authentication may return the following additional error code:
If signature verification failed, the card returns ‘6300’.
This command is used for the generation 2 chip authentication protocol specified in Appendix 11 Part B and is compliant with ISO/IEC 7816-4.
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘00h’ | |
| INS | 1 | ‘86h’ | |
| P1 | 1 | ‘00h’ | Keys and protocol implicitly known |
| P2 | 1 | ‘00h’ | |
| Lc | 1 | ‘NNh’ | Lc: length of subsequent data field |
| #6-#(5+L) | L | ‘7Ch’ + L7C + ‘80h’ + L80 + ‘XX..XXh’ | DER-TLV encoded ephemeral public key value (see Appendix 11) The VU shall send the data objects in this order. |
| [F125 + L + 1 | 1 | ‘ 00h ’ | As specified in ISO/IEC 7816-4] |
| Byte | Length | Value | Description |
|---|---|---|---|
| #1-#L | L | ‘7Ch’ + L7C + ‘81h’ + ‘08h’ + ‘XX..XXh’ + ‘82h’ + L82 + ‘XX..XXh’ | DER-TLV encoded Dynamic Authentication Data: nonce and authentication token (see Appendix 11) |
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If the command is successful, the card returns ‘9000’.
The card returns ‘6A80’ to indicate incorrect parameters in data field.
The card returns ‘6982’ if the External Authenticate command has not been performed successfully
The response Dynamic Authentication Data object ‘7Ch’
must be present if the operation is successful, i.e. the Status Words are ‘9000’,
must be absent in case of an execution error or checking error, i.e. if the Status Words are in the range ‘6400’ — ‘6FFF’, and
may be absent in case of a warning, i.e. if the Status Words are in the range ‘6200’ — ‘63FF’.
This command is used to set a public key for authentication purpose.
This command is compliant with ISO/IEC 7816-4. The use of this command is restricted regarding the related standard.
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘00h’ | CLA |
| INS | 1 | ‘22h’ | INS |
| P1 | 1 | ‘C1h’ | P1: referenced key valid for all cryptographic operations |
| P2 | 1 | ‘B6h’ | P2 (referenced data concerning Digital Signature) |
| Lc | 1 | ‘0Ah’ | Lc: length of subsequent data field |
| #6 | 1 | ‘83h’ | Tag for referencing a public key in asymmetric cases |
| #7 | 1 | ‘08h’ | Length of the key reference (key identifier) |
| #8-#15 | 8 | ‘XX..XXh’ | Key identifier as specified in Appendix 11 |
| Byte | Length | Value | Description |
|---|---|---|---|
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If the command is successful, the card returns ‘9000’.
If the referenced key is not present into the card, the processing state returned is ‘6A88’.
If some expected data objects are missing in the secure messaging format, the processing state ‘6987’ is returned. This can happen if the tag ‘83h’ is missing.
If some data objects are incorrect, the processing state returned is ‘6988’. This can happen if the length of the key identifier is not ‘08h’.
If the selected key is considered corrupted, the processing state returned is ‘6400’ or ‘6581’.
For the Generation 2 authentication the tachograph card supports the following MSE: Set command versions which are compliant with ISO/IEC 7816-4. These command versions are not supported for the Generation 1 authentication.
The following MSE:SET AT command is used to select the parameters for the Chip Authentication that is performed by a subsequent General Authenticate command.
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘00h’ | |
| INS | 1 | ‘22h’ | |
| P1 | 1 | ‘41h’ | Set for internal authentication |
| P2 | 1 | ‘A4h’ | Authentication |
| Lc | 1 | ‘NNh’ | Lc: length of subsequent data field |
| #6-#(5+L) | L | ‘80h’ + ‘0Ah’ + ‘XX..XXh’ | DER-TLV encoded cryptographic mechanism reference: Object Identifier of Chip Authentication (value only, Tag ‘06h’ is omitted). See Appendix 1 for the values of object identifiers; the byte notation shall be used. See Appendix 11 for guidance on how to select one of these object identifiers. |
The following MSE:SET AT command is used to select the parameters and keys for the VU Authentication that is performed by a subsequent External Authenticate command.
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘00h’ | |
| INS | 1 | ‘22h’ | |
| P1 | 1 | ‘81h’ | Set for external authentication |
| P2 | 1 | ‘A4h’ | Authentication |
| Lc | 1 | ‘NNh’ | Lc: length of subsequent data field |
| #6-#(5+L) | L | ‘80h’ + ‘0Ah’ + ‘XX..XXh’ | DER-TLV encoded cryptographic mechanism reference: Object Identifier of VU Authentication (value only, Tag ‘06h’ is omitted). See Appendix 1 for the values of object identifiers; the byte notation shall be used. See Appendix 11 for guidance on how to select one of these object identifiers. |
| ‘83h’ + ‘08h’ + ‘XX..XXh’ | DER-TLV encoded reference of the VU public key by the Certificate Holder Reference mentioned in its certificate. | ||
| ‘91h’ + L91 + ‘XX..XXh’ | DER-TLV encoded compressed representation of the ephemeral public key of the VU that will be used during Chip Authentication (see Appendix 11) |
The following MSE:SET DST command is used to set a public key either
for the verification of a signature that is provided in a subsequent PSO: Verify Digital Signature command or
for the signature verification of a certificate that is provided in a subsequent PSO: Verify Certificate command
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘00h’ | |
| INS | 1 | ‘22h’ | |
| P1 | 1 | ‘81h’ | Set for verification |
| P2 | 1 | ‘B6h’ | Digital Signature |
| Lc | 1 | ‘NNh’ | Lc: length of subsequent data field |
| #6-#(5+L) | L | ‘83h’ + ‘08h’ + ‘XX...XXh’ | DER-TLV encoded reference of a public key, i.e. the Certificate Holder Reference in the certificate of the public key (see Appendix 11) |
For all command versions the response message structure and status words are given by:
| Byte | Length | Value | Description |
|---|---|---|---|
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If the command is successful, the card returns ‘9000’. The protocol has been selected and initialised.
‘6A80’ indicates incorrect parameters in the command data field.
‘6A88’ indicates that referenced data (i.e. a referenced key) is not available.
[F12If the currentAuthenticatedTime of the card is later than the Expiration Date of the selected public key, the processing state returned is ‘ 6A88 ’ .
Similarly, in case an MSE: SET DST command referencing an EQT (i.e. a VU or a card) is sent to a control card, according to CSM_234 the referenced key is always an EQT_Sign key that has to be used for the verification of a digital signature. According to Figure 13 in Appendix 11, the control card will always have stored the relevant EQT_Sign public key. In some cases, the control card may have stored the corresponding EQT_MA public key. The control card shall always set the EQT_Sign public key for use when it receives an MSE: SET DST command.]
This command is used to transfer to the card the result of a hash calculation on some data. This command is used for the verification of digital signatures. The hash value is stored temporarily for the subsequent command PSO: Verify Digital Signature
This command is compliant with ISO/IEC 7816-8. The use of this command is restricted regarding the related standard.
Only the control card is required to support this command in the DF Tachograph and DF Tachograph_G2.
Other types of tachograph cards may or may not implement this command. The command may or may not be accessible in the MF.
The control card application generation 1 supports only SHA-1.
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘00h’ | CLA |
| INS | 1 | ‘2Ah’ | Perform Security Operation |
| P1 | 1 | ‘90h’ | Return Hash code |
| P2 | 1 | ‘A0h’ | Tag: data field contains DOs relevant for hashing |
| Lc | 1 | ‘XXh’ | Length Lc of the subsequent data field |
| #6 | 1 | ‘90h’ | Tag for the hash code |
| #7 | 1 | ‘XXh’ | Length L of the hash code:
|
| #8-#(7+L) | L | ‘XX..XXh’ | Hash code |
| Byte | Length | Value | Description |
|---|---|---|---|
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If the command is successful, the card returns ‘9000’.
If some expected data objects (as specified above) are missing, the processing state ‘6987’ is returned. This can happen if one of the tag ‘90h’ is missing.
If some data objects are incorrect, the processing state returned is ‘6988’. This error happens if the required tag is present but with a length different from ‘14h’ for SHA-1, ‘20h’ for SHA-256, ‘30h’ for SHA-384, ‘40h’ for SHA-512 (Generation 2 application).
This command is not compliant with ISO/IEC 7816-8. Thus the CLA byte of this command indicates that there is a proprietary use of the PERFORM SECURITY OPERATION / HASH.
Only the driver card and the workshop card are required to support this command in the DF Tachograph and DF Tachograph_G2.
Other types of tachograph cards may or may not implement this command. If a company or control card implements this command, the command shall be implemented as specified in this chapter.
The command may or may not be accessible in the MF. If so, the command shall be implemented as specified in this chapter, i.e. shall not allow the calculation of a hash value, but terminate with a suitable error code.
| [F2Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘ 80h ’ | CLA |
| INS | 1 | ‘ 2Ah ’ | Perform Security Operation |
| P1 | 1 | ‘ 90h ’ | Tag: Hash |
| P2 | 1 | ‘ 00h ’ | Algorithm implicitly known For the Tachograph Generation 1 application: SHA-1 For the Tachograph Generation 2 application: SHA-2 algorithm (SHA-256, SHA-384 or SHA-512) defined by the cipher suite in Appendix 11 Part B for the card signature key Card_Sign] |
| Byte | Length | Value | Description |
|---|---|---|---|
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If the command is successful, the card returns ‘9000’.
If the current EF does not allow this command (EF Sensor_Installation_Data in DF Tachograph_G2), the processing state ‘6985’ is returned.
If the selected EF is considered corrupted (file attributes or stored data integrity errors), the processing state returned is ‘6400’ or ‘6581’.
If the selected file is not a transparent file or if there is no current EF, the processing state returned is ‘6986’.
[F2This command is used to compute the digital signature of previously computed hash code (see PERFORM HASH of FILE, §3.5.13).
Only the driver card and the workshop card are required to support this command in the DF Tachograph and DF Tachograph_G2.
Other types of tachograph cards may or may not implement this command. In case of the Generation 2 tachograph application, only the driver card and the workshop card have a generation 2 signature key, other cards are not able to successfully perform the command and terminate with a suitable error code.
The command may or may not be accessible in the MF. If the command is not accessible in the MF, it shall terminate with a suitable error code.
This command is compliant with ISO/IEC 7816-8. The use of this command is restricted regarding the related standard.]
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘00h’ | CLA |
| INS | 1 | ‘2Ah’ | Perform Security Operation |
| P1 | 1 | ‘9Eh’ | Digital signature to be returned |
| P2 | 1 | ‘9Ah’ | Tag: data field contains data to be signed. As no data field is included, the data are supposed to be already present in the card (hash of file) |
| Le | 1 | ‘NNh’ | Length of the expected signature |
| Byte | Length | Value | Description |
|---|---|---|---|
| #1-#L | L | ‘XX..XXh’ | Signature of the previously computed hash |
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If the command is successful, the card returns ‘9000’.
If the implicitly selected private key is considered as corrupted, the processing state returned is ‘6400’ or ‘6581’.
If the hash which was computed in a previous Perform Hash of File command is not available, the processing state returned is ‘6985’.
This command is used to verify the digital signature, provided as an input, whose hash is known to the card. The signature algorithm is implicitly known by the card.
This command is compliant with ISO/IEC 7816-8. The use of this command is restricted regarding the related standard.
Only the control card is required to support this command in the DF Tachograph and DF Tachograph_G2.
Other types of tachograph cards may or may not implement this command. The command may or may not be accessible in the MF.
| [F2Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘ 00h ’ | CLA |
| INS | 1 | ‘ 2Ah ’ | Perform Security Operation |
| P1 | 1 | ‘ 00h ’ | |
| P2 | 1 | ‘ A8h ’ | Tag: data field contains DOs relevant for verification |
| Lc | 1 | ‘ XXh ’ | Length Lc of the subsequent data field |
| #6 | 1 | ‘ 9Eh ’ | Tag for Digital Signature |
#7 or #7-#8 | L | ‘NNh’ or ‘81 NNh’ | Length of digital signature (L is 2 bytes if the digital signature is longer than 127 bytes):
|
| #(7+L)-#(6+L+NN) | NN | ‘ XX..XXh ’ | Digital signature content] |
| Byte | Length | Value | Description |
|---|---|---|---|
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If the command is successful, the card returns ‘9000’.
If the verification of the signature fails, the processing state returned is ‘6688’. The verification process is described in Appendix 11.
If no public key is selected, the processing state returned is ‘6A88’.
If some expected data objects (as specified above) are missing, the processing state ‘6987’ is returned. This can happen if one of the required tag is missing.
If no hash code is available to process the command (as a result of a previous PSO: Hash command), the processing state returned is ‘6985’.
If some data objects are incorrect, the processing state returned is ‘6988’. This can happen if one of the required data objects length is incorrect.
If the selected public key is considered corrupted, the processing state returned is ‘6400’ or ‘6581’.
[F12If the selected public key (used to verify the digital signature) has a CHA.LSB (CertificateHolderAuthorisation.equipmentType) that is not suitable for the digital signature verification according to Appendix 11, the processing state returned is ‘ 6985 ’.]
This command is used to verify the integrity and authenticity of the DSRC message and to decipher the data communicated from a VU to a control authority or a workshop over the DSRC link. The card derives the encryption key and the MAC key used to secure the DSRC message as described in Appendix 11 Part B chapter 13.
Only the control card and the workshop card are required to support this command in the DF Tachograph_G2.
Other types of tachograph cards may or may not implement this command, but shall not have a DSRC master key. Therefore these cards cannot perform the command successfully, but terminate with a suitable error code.
The command may or may not be accessible in the MF and / or the DF Tachograph. If so, the command shall terminate with a suitable error code.
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘80h’ | Proprietary CLA |
| INS | 1 | ‘2Ah’ | Perform Security Operation |
| P1 | 1 | ‘80h’ | Response data: plain value |
| P2 | 1 | ‘B0h’ | Command data: plain value encoded in BER-TLV and including SM DOs |
| Lc | 1 | ‘NNh’ | Length Lc of the subsequent data field |
| #6-#(5+L) | L | ‘87h’ + L87 + ‘XX..XXh’ | DER-TLV encoded padding-content indicator byte followed by encrypted tachograph payload. For the padding-content indicator byte the value ‘00h’ (‘no further indication’ according to ISO/IEC 7816-4:2013 Table 52) shall be used. For the encryption mechanism see Appendix 11, Part B chapter 13. Allowed values for the length L87 are the multiples of the AES block length plus 1 for the padding-content indicator byte, i.e. from 17 bytes up to and including 193 bytes. Note: See ISO/IEC 7816-4:2013 Table 49 for the SM data object with tag ‘87h’. |
| ‘81h’ + ‘10h’ | DER-TLV encoded Control Reference Template for Confidentiality nesting the concatenation of the following data elements (see Appendix 1 DSRCSecurityData and Appendix 11 Part B chapter 13):
Note: See ISO/IEC 7816-4:2013 Table 49 for the SM data object with tag ‘81h’. | ||
| ‘8Eh’ + L8E + ‘XX..XXh’ | DER-TLV encoded MAC over the DSRC message. For the MAC algorithm and calculation see Appendix 11, Part B chapter 13. Note: See ISO/IEC 7816-4:2013 Table 49 for the SM data object with tag ‘8Eh’. | ||
| [F125 + L + 1 | 1 | ‘ 00h ’ | As specified in ISO/IEC 7816-4] |
| Byte | Length | Value | Description |
|---|---|---|---|
| #1-#L | L | ‘XX..XXh’ | Absent (in case of an error) or deciphered data (padding removed) |
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If the command is successful, the card returns ‘9000’.
‘6A80’ indicates incorrect parameters in the command data field (also used in case the data objects are not sent in the specified order).
‘6A88’ indicates that referenced data is not available, i.e. the referenced DSRC master key is not available.
‘6900’ indicates that the verification of the cryptographic checksum or the decryption of the data failed.
‘ [F126985 ’ indicates that the 4-byte time stamp provided in the command data field is earlier than cardValidityBegin or later than cardExpiryDate.]
This paragraph specifies the file structures of the Tachograph cards for storage of accessible data.
It does not specify card manufacturer dependent internal structures, such as e.g. file headers, nor storage and handling of data elements needed for internal use only such as ,
,
or
.
The maximum and minimum numbers of records are specified in this chapter for the different applications.
For the security conditions used in the access rules throughout this chapter please refer to chapter 3.3. In general the access mode ‘read’ denotes the READ BINARY command with even and if supported odd INS byte with the exception of the EF Sensor_Installation_Data on the workshop card, see TCS_156 and TCS_160. The access mode ‘update’ denotes the Update Binary command with even and if supported odd INS byte and the access mode ‘select’ the SELECT command.
Note: The short EF identifier SFID is given as decimal number, e.g. the value 30 corresponds to 11110 in binary.U.K.
The following abbreviation for the security condition is used in this table:
ALW OR SM-MAC-G2
The value ‘01’ indicates extended length field support for the T = 1 protocol.
The value ‘10’ indicates extended length field support for the T = 0 protocol.
The value ‘11’ indicates extended length field support for the T = 1 and the T = 0 protocol.
The following abbreviations for the security conditions are used in this table:
ALW OR SM-MAC-G2
ALW OR SM-MAC-G1 OR SM-MAC-G2
SM-MAC-G1 OR SM-MAC-G2
Note: The short EF identifier SFID is given as decimal number, e.g. the value 30 corresponds to 11110 in binary.U.K.
The following abbreviation for the security condition is used in this table:
ALW OR SM-MAC-G2
The following abbreviations for the security conditions are used in this table:
ALW OR SM-MAC-G2
ALW OR SM-MAC-G1 OR SM-MAC-G2
SM-MAC-G1 OR SM-MAC-G2
For the READ BINARY command with even INS byte:
(SM-C-MAC-G1 AND SM-R-ENC-MAC-G1) OR
(SM-C-MAC-G2 AND SM-R-ENC-MAC-G2)
For the READ BINARY command with odd INS byte (if supported): NEV]
Note: The short EF identifier SFID is given as decimal number, e.g. the value 30 corresponds to 11110 in binary.U.K.
The following abbreviations for the security conditions are used in this table:
ALW OR SM-MAC-G2
For the Read Binary command with even INS byte: SM-C-MAC-G2 AND SM-R-ENC-MAC-G2
For the Read Binary command with odd INS byte (if supported): NEV
The following abbreviations for the security conditions are used in this table:
ALW OR SM-MAC-G2
ALW OR SM-MAC-G1 OR SM-MAC-G2
SM-MAC-G1 OR SM-MAC-G2
EXT-AUT-G1 OR SM-MAC-G1 OR SM-MAC-G2
Note: The short EF identifier SFID is given as decimal number, e.g. the value 30 corresponds to 11110 in binary.U.K.
The following abbreviation for the security condition is used in this table:
ALW OR SM-MAC-G2
The following abbreviations for the security conditions are used in this table:
ALW OR SM-MAC-G2
ALW OR SM-MAC-G1 OR SM-MAC-G2
SM-MAC-G1 OR SM-MAC-G2
EXT-AUT-G1 OR SM-MAC-G1 OR SM-MAC-G2
Note: The short EF identifier SFID is given as decimal number, e.g. the value 30 corresponds to 11110 in binary.U.K.
The following abbreviation for the security condition is used in this table:
ALW OR SM-MAC-G2
BASIC PICTOGRAMS
PICTOGRAM COMBINATIONS
| Miscellaneous | |||
|---|---|---|---|
| Control place | |||
| Location start of daily work period | Location end of daily work period | ||
| [F12Position after 3 hours accumulated driving time ] | |||
| From time | To time | ||
| From vehicle | |||
| Out of scope begin | Out of scope end |
| Events | |
|---|---|
| Insertion of a non valid card | |
| Card conflict | |
| Time overlap | |
| Driving without an appropriate card | |
| Card insertion while driving | |
| Last card session not correctly closed | |
| Over speeding | |
| Power supply interruption | |
| Motion data error | |
| Vehicle motion conflict | |
| Security breach | |
| [F2Time conflict or time adjustment (by workshop)] | |
| Over speeding control | |
| [F12Absence of position information from GNSS receiver or Communication error with the external GNSS facility | |
| Communication error with the remote communication facility] |
Note: Additional pictogram combinations to form printout blocks or record identifiers are defined in Appendix 4.U.K.
Each printout is built up by chaining various data blocks, possibly identified with a block identifier.
A data block contains one or more records, possibly identified with a record identifier.
When a block identifier immediately precedes a record identifier, the record identifier is not printed.
In the case where a data item is unknown, or must not be printed for data access rights reasons, spaces are printed instead.
If the content of a complete line is unknown, or need not to be printed, then the complete line is omitted.
Numerical data fields are printed right aligned, with a space separator for thousands and millions, and without leading zeros.
String data fields are printed left aligned and filled up with spaces to data item length, or truncated to data item length when needed (names and addresses).
In case of a line-break due to a long text a special character (dot at middle line-height, ‘•’) should be printed as first character in the new line.
In this chapter the following format notation conventions have been used:
Characters printed in bold denote plain text to be printed (printing remains in normal characters),
Normal characters denote variables (pictograms or data) to be replaced by their values for printing,
Variable names have been padded with underscores to show the data item length available for the variable,
Dates are specified with a ‘dd/mm/yyyy’ (day, month, year) format. A ‘dd.mm.yyyy’ format may also be used,
The term ‘card identification’ denotes the composition of: the type of card through a card pictograms combination, the card issuing Member State code, a forward slash character and the card number with the replacement index and the renewal index separated with a space:
In this chapter the following notation conventions have been used:
| N | Print block or record number N |
| N | Print block or record number N repeated as many times as necessary |
| X/Y | Print blocks or records X and/or Y as needed, and repeating as many times as necessary. |
| 1 | Date and time at which the document is printed |
| 2 | Type of printout |
| 3 | Controller identification (if a control card is inserted in the VU) |
| 3 | Driver identification (from card subject of the printout + GEN) |
| 4 | Vehicle identification (vehicle from which printout is taken) |
| 5 | VU identification (VU from which printout is taken + GEN) |
| 6 | Last calibration of this VU |
| 7 | Last control the inspected driver has been subject to |
| 8 | Driver activities delimiter |
| 8a | Out of scope condition in the beginning of this day |
| 8.1a/8.1b/8.1c/8.2/8.3/8.3a/8.4 | Activities of the driver in order of occurrence |
| 11 | Daily summary delimiter |
| 11.4 | Places entered in chronological order |
| [F211.5 | Positions after 3 hours accumulated driving time in chronological order] |
| 11.6 | Activity totals |
| 12.1 | Events or faults from card delimiter |
| 12.4 | Event/Fault records (Last 5 events or faults stored in the card) |
| 13.1 | Events or faults from VU delimiter |
| 13.4 | Event/Fault records (Last 5 events or faults stored or on-going in the VU) |
| 22.1 | Control place |
| 22.2 | Controller's signature |
| 22.5 | Driver's signature |
| [F21 | Date and time at which the document is printed | ||
| 2 | Type of printout | ||
| 3 | Card holder identification (for all cards inserted in VU + GEN) | ||
| 4 | Vehicle identification (vehicle from which printout is taken) | ||
| 5 | VU identification (VU from which printout is taken + GEN) | ||
| 6 | Last calibration of this VU | ||
| 7 | Last control on this tachograph | ||
| 9 | Driver activities delimiter | ||
| 10 | Driver slot delimiter (slot 1) | ||
| 10a | Out of scope condition in the beginning of this day | ||
| 10.1 / 10.2 / 10.3 / 10.3a / 10.4 | Activities in chronological order (driver slot) | ||
| 10 | Co-driver slot delimiter (slot 2) | ||
| 10a | Out of scope condition in the beginning of this day | ||
| 10.1 / 10.2 / 10.3 / 10.3a / 10.4 | Activities in chronological order (co-driver slot) | ||
| 11 | Daily summary delimiter | ||
| 11.1 | Summary of periods without card in driver slot | ||
| 11.4 | Places entered in chronological order | ||
| 11.5 | Positions after 3 hours accumulated driving time in chronological order | ||
| 11.7 | Activity totals | ||
| 11.2 | Summary of periods without card in co-driver slot | ||
| 11.4 | Places entered in chronological order | ||
| 11.5 | Positions after 3 hours accumulated driving time in chronological order | ||
| 11.8 | Activity totals | ||
| 11.3 | Summary of activities for a driver both slots included | ||
| 11.4 | Places entered by this driver in chronological order | ||
| 11.5 | Positions after 3 hours accumulated driving time in chronological order | ||
| 11.9 | Activity totals for this driver | ||
| 13.1 | Events faults delimiter | ||
| 13.4 | Event/Fault records (Last 5 events or faults stored or on-going in the VU) | ||
| 22.1 | Control place | ||
| 22.2 | Controller’s signature | ||
| 22.3 | From time (space available for a driver without a card to indicate | ||
| 22.4 | To time which periods are relevant to himself) | ||
| 22.5 | Driver's signature] | ||
| 1 | Date and time at which the document is printed |
| 2 | Type of printout |
| 3 | Controller identification (if a control card is inserted in the VU + GEN) |
| 3 | Driver identification (from card subject of the printout) |
| 4 | Vehicle identification (vehicle from which printout is taken) |
| 12.2 | Events delimiter |
| 12.4 | Event records (all events stored on the card) |
| 12.3 | Faults delimiter |
| 12.4 | Fault records (all faults stored on the card) |
| 22.1 | Control place |
| 22.2 | Controller's signature |
| 22.5 | Driver's signature |
| 1 | Date and time at which the document is printed |
| 2 | Type of printout |
| 3 | Card holder identification (for all cards inserted in VU + GEN) |
| 4 | Vehicle identification (vehicle from which printout is taken) |
| 13.2 | Events delimiter |
| 13.4 | Event records (All Events stored or on-going in the VU) |
| 13.3 | Faults delimiter |
| 13.4 | Fault records (All Faults stored or on-going in the VU) |
| 22.1 | Control place |
| 22.2 | Controller's signature |
| 22.5 | Driver's signature |
| 1 | Date and time at which the document is printed |
| 2 | Type of printout |
| 3 | Card holder identification (for all cards inserted in VU + GEN) |
| 4 | Vehicle identification (vehicle from which printout is taken) |
| 14 | VU identification |
| 15 | Sensor identification |
| 15.1 | Sensor Pairing data (all data available in chronological order) |
| 16 | GNSS identification |
| 16.1 | External GNSS facility coupling data (all data available in chronological order) |
| 17 | Calibration data delimiter |
| 17.1 | Calibration records (all records available in chronological order) |
| 18 | Time adjustment delimiter |
| 18.1 | Time adjustment records (all records available from time adjustment and from calibration data records) |
| 19 | Most recent event and Fault recorded in the VU |
| 1 | Date and time at which the document is printed |
| 2 | Type of printout |
| 3 | Card holder identification (for all cards inserted in VU + GEN) |
| 4 | Vehicle identification (vehicle from which printout is taken) |
| 20 | Over speeding control information |
| 21.1 | Over speeding data identifier |
| 21.4/21.5 | First over speeding after the last calibration |
| 21.2 | Over speeding data identifier |
| 21.4/21.5 | The 5 most serious over speeding events over the last 365 days |
| 21.3 | Over speeding data identifier |
| 21.4/21.5 | The most serious over speeding for each of the last 10 days of occurrence |
| 22.1 | Control place |
| 22.2 | Controller's signature |
| 22.5 | Driver's signature |
| 1 | Date and time at which the document is printed |
| 2 | Type of printout |
| 3 | Card holder identifications (of all cards inserted in the VU) |
| 23 | Most recent card inserted in the VU |
| 23.1 | Inserted cards (up to 88 records) |
| 12.3 | Faults delimiter] |
In this appendix the following format notation conventions have been used:
characters printed in bold denote plain text to be displayed (display remains in normal character),
normal characters denote variables (pictograms or data) to be replaced by their values for displaying:
:
day, month, year,
:
hours,
:
minutes,
:
duration pictogram,
:
event or fault pictograms combination,
:
mode of operation pictogram.
The following diagram shows a typical 6 pin mating plug:
| Pin | Description | Remark |
|---|---|---|
| 1 | Battery minus | Connected to the battery minus of the vehicle |
| 2 | Data communication | K-line (ISO 14230-1) |
| 3 | RxD — Downloading | Data input to tachograph |
| 4 | Input/output signal | Calibration |
| 5 | Permanent power output | The voltage range is specified to be that of the vehicle power minus 3V to allow for the voltage drop across the protective circuitry Output 40 mA |
| 6 | TxD — Downloading | Data output from tachograph |
:
one bit with logic level 0;
:
transmitted with LSB first;
:
even parity
:
one bit with logic level 1
When numerical data composed by more than one byte are transmitted, the most significant byte is transmitted first and the least significant byte last.
| Parameter | Minimum | Typical | Maximum | Remark |
|---|---|---|---|---|
| U low (in) | 1,0 V | I = 750 μA | ||
| U high (in) | 4 V | I = 200 μA | ||
| Frequency | 4 kHz | |||
| U low (out) | 1,0 V | I = 1 mA | ||
| U high (out) | 4 V | I = 1 mA |
This appendix specifies the procedures to follow in order to perform the different types of data download to an External Storage Medium, together with the protocols that must be implemented to assure the correct data transfer and the full compatibility of the downloaded data format to allow any controller to inspect these data and be able to control their authenticity and their integrity before analysing them.
Data may be downloaded to an ESM:
from a Vehicle Unit by an Intelligent Dedicated Equipment (IDE) connected to the VU,
from a tachograph card by an IDE fitted with a card interface device (IFD),
from a tachograph card via a vehicle unit by an IDE connected to the VU.
To give the possibility to verify the authenticity and integrity of downloaded data stored on an ESM, data is downloaded with a signature appended in accordance with Appendix 11 Common Security Mechanisms. The source equipment (VU or card) identification and its security certificates (Member state and equipment) are also downloaded. The verifier of the data must possess independently a trusted European public key.
Data downloaded from a VU are signed using Appendix 11 Common Security Mechanisms Part B (Second-generation tachograph system), except when drivers' control is performed by a non EU control authority, using a first generation control card, in which case data are signed using Appendix 11 Common Security Mechanisms Part A (First-generation tachograph system), as requested by Appendix 15 Migration, requirement MIG_015.
This Appendix specifies therefore two types of data downloads from the VU:
Generation 2 type of VU data download, providing the generation 2 data structure, signed using Appendix 11 Common Security Mechanisms Part B,
Generation 1 type of VU data download, providing the generation 1 data structure, signed using Appendix 11 Common Security Mechanisms Part A.
Similarly, there are two types of data downloads from second generation driver cards inserted in a VU, as specified in paragraphs 3 and 4 of this Appendix.]
The following acronyms are used in this appendix:
Application Identifier
Answer To Reset
Checksum byte
Dedicated File
Diagnostic Session
Elementary File
External Storage Medium
File Identifier (File ID)
Format Byte (first byte of message header)
Integrated Circuit Card
Intelligent Dedicated Equipment: The equipment used to perform data downloading to the ESM (e.g. Personal Computer)
Interface Device
Keyword Protocol 2000
Length Byte (last byte of message header)
Protocol Parameter Selection
Perform Security Operation
Service Identifier
Source byte
Target Byte
Tag Length Value
Transfer Response Parameter
Transfer Request Parameter
Vehicle Unit
In order to carry on a VU data download, the operator must perform the following operations:
Insert his tachograph card inside a card slot of the VU(21);
Connect the IDE to the VU download connector;
Establish the connection between the IDE and the VU;
Select on the IDE the data to download and send the request to the VU;
Close the download session.
The protocol is structured on a master-slave basis, with the IDE playing the master role and the VU playing the slave role.
The message structure, types and flow are principally based on the Keyword Protocol 2000 (KWP) (ISO 14230-2 Road vehicles — Diagnostic systems — Keyword protocol 2000 — Part2: Data link layer).
The application layer is principally based on the current draft to date of ISO 14229-1 (Road vehicles — Diagnostic systems — Part 1: Diagnostic services, version 6 of 22 February 2001).
Header composed by a Format byte (FMT), a Target byte (TGT), a Source byte (SRC) and possibly a Length byte (LEN),
Data field composed by a Service Identifier byte (SID) and a variable number of data bytes, which can include an optional diagnostic session byte (DS_) or an optional transfer parameter byte (TRTP or TREP).
Checksum composed by a Checksum byte (CS).
| Header | Data field | Checksum | |||||||
|---|---|---|---|---|---|---|---|---|---|
| FMT | TGT | SRC | LEN | SID | DATA | … | … | … | CS |
| 4 bytes | Max 255 bytes | 1 byte | |||||||
The TGT and SRC byte represent the physical address of the recipient and originator of the message. Values are F0 Hex for the IDE and EE Hex for the VU.
The LEN byte is the length of the Data field part.
The Checksum byte is the 8 bit sum series modulo 256 of all the bytes of the message excluding the CS itself.
FMT, SID, DS_, TRTP and TREP bytes are defined later in this document.
Example:
| Header | SID | TREP | Message | CS |
|---|---|---|---|---|
| 4 Bytes | Longer than 255 Bytes | |||
Will be transmitted as:
| Header | SID | TREP | 00 | 01 | Sub message 1 | CS |
|---|---|---|---|---|---|---|
| 4 Bytes | 255 Bytes | |||||
| Header | SID | TREP | 00 | 02 | Sub message 2 | CS |
|---|---|---|---|---|---|---|
| 4 Bytes | 255 Bytes | |||||
…
| Header | SID | TREP | xx | yy | Sub message n | CS |
|---|---|---|---|---|---|---|
| 4 Bytes | Less than 255 Bytes | |||||
or as:
| Header | SID | TREP | 00 | 01 | Sub message 1 | CS |
|---|---|---|---|---|---|---|
| 4 Bytes | 255 Bytes | |||||
| Header | SID | TREP | 00 | 02 | Sub message 2 | CS |
|---|---|---|---|---|---|---|
| 4 Bytes | 255 Bytes | |||||
…
| Header | SID | TREP | xx | yy | Sub message n | CS |
|---|---|---|---|---|---|---|
| 4 Bytes | 255 Bytes | |||||
| Header | SID | TREP | xx | yy + 1 | CS |
|---|---|---|---|---|---|
| 4 Bytes | 4 bytes | ||||
The communication protocol for data download between the VU and the IDE requires the exchange of 8 different message types.
The following table summarises these messages.
| [F2Message Structure | Max 4 Bytes Header | Max 255 Bytes Data | 1 Byte CheckSum | ||||||
|---|---|---|---|---|---|---|---|---|---|
| IDE -> | <- VU | FMT | TGT | SRC | LEN | SID | DS_ / TRTP | DATA | CS |
| Start Communication Request | 81 | EE | F0 | 81 | E0 | ||||
| Positive Response Start Communication | 80 | F0 | EE | 03 | C1 | EA, 8F | 9B | ||
| Start Diagnostic Session Request | 80 | EE | F0 | 02 | 10 | 81 | F1 | ||
| Positive Response Start Diagnostic | 80 | F0 | EE | 02 | 50 | 81 | 31 | ||
| Link Control Service | |||||||||
| Verify Baud Rate (stage 1) | |||||||||
| 9 600 Bd | 80 | EE | F0 | 04 | 87 | 01,01,01 | EC | ||
| 19 200 Bd | 80 | EE | F0 | 04 | 87 | 01,01,02 | ED | ||
| 38 400 Bd | 80 | EE | F0 | 04 | 87 | 01,01,03 | EE | ||
| 57 600 Bd | 80 | EE | F0 | 04 | 87 | 01,01,04 | EF | ||
| 115 200 Bd | 80 | EE | F0 | 04 | 87 | 01,01,05 | F0 | ||
| Positive Response Verify Baud Rate | 80 | F0 | EE | 02 | C7 | 01 | 28 | ||
| Transition Baud Rate (stage 2) | 80 | EE | F0 | 03 | 87 | 02,03 | ED | ||
| Request Upload | 80 | EE | F0 | 0A | 35 | 00,00,00,00,00,FF,FF, FF,FF | 99 | ||
| Positive Response Request Upload | 80 | F0 | EE | 03 | 75 | 00,FF | D5 | ||
| Transfer Data Request | |||||||||
| Overview | 80 | EE | F0 | 02 | 36 | 01 or 21 | 97 | ||
| Activities | 80 | EE | F0 | 06 | 36 | 02 or 22 | Date | CS | |
| Events & Faults | 80 | EE | F0 | 02 | 36 | 03 or 23 | Date | 99 | |
| Detailed Speed | 80 | EE | F0 | 02 | 36 | 04 or 24 | Date | 9 A | |
| Technical Data | 80 | EE | F0 | 02 | 36 | 05 or 25 | Date | 9B | |
| Card download | 80 | EE | F0 | 02 | 36 | 06 | Slot | CS | |
| Positive Response Transfer Data | 80 | F0 | EE | Len | 76 | TREP | Data | CS | |
| Request Transfer Exit | 80 | EE | F0 | 01 | 37 | 96 | |||
| Positive Response Request Transfer Exit | 80 | F0 | EE | 01 | 77 | D6 | |||
| Stop Communication Request | 80 | EE | F0 | 01 | 82 | E1 | |||
| Positive Response Stop Communication | 80 | F0 | EE | 01 | C2 | 21 | |||
| Acknowledge sub message | 80 | EE | F0 | Len | 83 | Data | CS | ||
| Negative responses | |||||||||
| General reject | 80 | F0 | EE | 03 | 7F | Sid Req | 10 | CS | |
| Service not supported | 80 | F0 | EE | 03 | 7F | Sid Req | 11 | CS | |
| Sub function not supported | 80 | F0 | EE | 03 | 7F | Sid Req | 12 | CS | |
| Incorrect Message Length | 80 | F0 | EE | 03 | 7F | Sid Req | 13 | CS | |
| Conditions not correct or Request sequence error | 80 | F0 | EE | 03 | 7F | Sid Req | 22 | CS | |
| Request out of range | 80 | F0 | EE | 03 | 7F | Sid Req | 31 | CS | |
| Upload not accepted | 80 | F0 | EE | 03 | 7F | Sid Req | 50 | CS | |
| Response pending | 80 | F0 | EE | 03 | 7F | Sid Req | 78 | CS | |
| Data not available | 80 | F0 | EE | 03 | 7F | Sid Req | FA | CS] | |
[F12TRTP 21 to 25 are used for Generation 2 type of VU data download requests, TRTP 01 to 05 are used for Generation 1 type of VU data download requests, which can only be accepted by the VU in the frame of drivers' control performed by a non EU control authority, using a first generation control card.
TRTP 11 to 19 and 31 to 39 are reserved for manufacturer specific download requests.]
Sid Req = the Sid of the corresponding request.
TREP = the TRTP of the corresponding request.
Dark cells denote that nothing is transmitted.
The term upload (as seen from the IDE) is used for compatibility with ISO 14229. It means the same as download (as seen from the VU).
Potential 2-byte sub message counters are not shown in this table.
Slot is the slot number, either “1” (card on driver slot) or “2” (card on co-driver slot)
In case the slot is not specified, the VU shall select slot 1 if a card is inserted in this slot and it shall select slot 2 only in case it is specifically selected by the user.
There are six types of data transfer. For VU data download, two different TRTP values can be used for each transfer type:
| Data transfer type | TRTP value for generation 1 type of VU data download | TRTP value for generation 2 type of VU data download |
|---|---|---|
| Overview | 01 | 21 |
| Activities of a specified date | 02 | 22 |
| Events and faults | 03 | 23 |
| Detailed speed | 04 | 24 |
| Technical data | 05 | 25 |
| Data transfer type | TRTP value |
| Card download | 06] |
In the second case (TRTP 02 or 22) the Transfer Data Request message includes the indication of the calendar day ( format) to be downloaded.]
Security certificates,
Vehicle identification,
VU current date and time,
Min and Max downloadable date (VU data),
Indication of cards presence in the VU,
Previous download to a company,
Company locks,
Previous controls.]
MsgC+1 Acknowledges correct receipt of sub message number MsgC.
Request from the IDE to the VU to send next sub message
MsgC indicates a problem with the receipt of sub message number MsgC.
Request from the IDE to the VU to send the sub message again.
FFFF requests termination of the message.
This can be used by the IDE to end the transmission of the VU message for any reason.
The last sub message of a message (LEN byte < 255) may be acknowledged using any of these codes or not acknowledged.
The VU responses that will consist of several sub messages are:
Positive Response Transfer Data (SID 76)
10 general reject
The action cannot be performed for a reason not covered below.
11 service not supported
The SID of the request is not understood.
12 sub function not supported
The DS_ or TRTP of the request is not understood, or there are no further sub messages to be transmitted.
13 incorrect message length
The length of the received message is wrong.
22 conditions not correct or request sequence error
The required service is not active or the sequence of request messages is not correct.
31 Request out of range
The request parameter record (data field) is not valid.
50 upload not accepted
The request cannot be performed (VU in a non appropriate mode of operation or internal fault of the VU).
78 response pending
The action requested cannot be completed in time and the VU is not ready to accept another request.
[F2FA data not available
The data object of a data transfer request are not available in the VU (e.g. no card is inserted, generation 1 type of VU data download requested outside the frame of a driver’s control by a non EU control authority…).]
A typical message flow during a normal data download procedure is the following:
| IDE | VU | |
|---|---|---|
| Start Communication Request | ⇨ | |
| ⇦ | Positive Response | |
| Start Diagnostic Service Request | ⇨ | |
| ⇦ | Positive Response | |
| Request Upload | ⇨ | |
| ⇦ | Positive Response | |
| Transfer Data Request Overview | ⇨ | |
| ⇦ | Positive Response | |
| Transfer Data Request #2 | ⇨ | |
| ⇦ | Positive Response #1 | |
| Acknowledge Sub Message #1 | ⇨ | |
| ⇦ | Positive Response #2 | |
| Acknowledge Sub Message #2 | ⇨ | |
| ⇦ | Positive Response #m | |
| Acknowledge Sub Message #m | ⇨ | |
| ⇦ | Positive Response (Data Field < 255 Bytes) | |
| Acknowledge Sub Message (optional) | ⇨ | |
| … | ||
| Transfer Data Request #n | ⇨ | |
| ⇦ | Positive Response | |
| Request Transfer Exit | ⇨ | |
| ⇦ | Positive Response | |
| Stop Communication Request | ⇨ | |
| ⇦ | Positive Response | |
Where:
=
Inter byte time for VU response.
=
Time between end of IDE request and start of VU response, or between end of IDE acknowledge and start of next VU response.
=
Time between end of VU response and start of new IDE request, or between end of VU response and start of IDE acknowledge, or between end of IDE request and start of new IDE request if VU fails to respond.
=
Inter byte time for IDE request.
=
Extended value of P3 for card downloading.
The allowed values for the timing parameters are showed in the following table (KWP extended timing parameters set, used in case of physical addressing for faster communication).
a If the VU responds with a Negative Response containing a code meaning ‘request correctly received, response pending’, this value is extended to the same upper limit value of P3. | ||
| Timing Parameter | Lower limitValue (ms) | Upper limitValue (ms) |
|---|---|---|
| P1 | 0 | 20 |
| P2 | 20 | 1 000a |
| P3 | 10 | 5 000 |
| P4 | 5 | 20 |
| P5 | 10 | 20 minutes |
If an error occurs during the message exchange, the message flow scheme is modified depending on which equipment has detected the error and on the message generating the error.
In figure 2 and figure 3 the error handling procedures for the VU and the IDE are respectively shown.
Two different error handling areas can be defined:
The VU detects an IDE transmission error.
For every received message the VU shall detect timing errors, byte format errors (e.g. start and stop bit violations) and frame errors (wrong number of bytes received, wrong checksum byte).
If the VU detects one of the above errors, then it sends no response and ignores the message received.
The VU may detect other errors in the format or content of the received message (e.g. message not supported) even if the message satisfies the length and checksum requirements; in such a case, the VU shall respond to the IDE with a Negative Response message specifying the nature of the error.
The IDE detects a VU transmission error.
For every received message the IDE shall detect timing errors, byte format errors (e.g. start and stop bit violations) and frame errors (wrong number of bytes received, wrong checksum byte).
The IDE shall detect sequence errors, e.g. incorrect sub message counter increments in successive received messages.
If the IDE detects an error or there was no response from the VU within a P2 max period, the request message will be sent again for a maximum of three transmissions in total. For the purposes of this error detection a sub message acknowledge will be considered as a request to the VU.
The IDE shall wait at least for a period of P3 min before beginning each transmission; the wait period shall be measured from the last calculated occurrence of a stop bit after the error was detected.
This paragraph specifies the content of the data fields of the various positive response messages.
Data elements are defined in Appendix 1 data dictionary.
Remark: For generation 2 downloads, each top-level data element is represented by a record array, even if it contains only one record. A record array starts with a header; this header contains the record type, the record size and the number of records. Record arrays are named by ‘…RecordArray’ (with header) in the following tables.U.K.
| [F2Data structure generation 1 (TREP 01 Hex)] | ||
| Data element | Comment | |
|---|---|---|
| VU Security certificates | ||
| Vehicle identification | ||
| VU current date and time | ||
| Downloadable period | ||
| Type of cards inserted in the VU | ||
| Previous VU download | ||
| All company locks stored. If the section is empty, only noOfLocks = 0 is sent. | ||
| All control records stored in the VU. If the section is empty, only noOfControls = 0 is sent | ||
| RSA signature of all data (except certificates) starting from VehicleIdentificationNumber down to last byte of last VuControlActivityData. | ||
| [F2Data structure generation 2 (TREP 21 Hex)] | ||
| Data element | Comment | |
|---|---|---|
| Member state certificate | ||
| VU certificate | ||
| Vehicle identification | ||
| Vehicle registration number | ||
| VU current date and time | ||
| Downloadable period | ||
| Type of cards inserted in the VU | ||
| Previous VU download | ||
| All company locks stored. If the section is empty, an array header with noOfRecords = 0 is sent | ||
| All control records stored in the VU. If the section is empty, an array header with noOfRecords = 0 is sent | ||
| ECC signature of all preceding data except the certificates. | ||
| [F2Data structure generation 1 (TREP 02 Hex)] | ||
| Data element | Comment | |
|---|---|---|
| Date of day downloaded | ||
| Odometer at end of downloaded day | ||
Cards insertion withdrawal cycles data.
| ||
| Slots status at 00:00 and activity changes recorded for the day downloaded. | ||
| Places related data recorded for the day downloaded. If the section is empty, only noOfPlaceRecords = 0 is sent. | ||
| Specific conditions data recorded for the day downloaded. If the section is empty, only noOfSpecificConditionRecords=0 is sent | ||
| RSA signature of all data starting from TimeReal down to last byte of last specific condition record. | ||
| [F2Data structure generation 2 (TREP 22 Hex)] | ||
| Data element | Comment | |
|---|---|---|
| Date of day downloaded | ||
| Odometer at end of downloaded day | ||
Cards insertion withdrawal cycles data.
| ||
| Slots status at 00:00 and activity changes recorded for the day downloaded. | ||
| Places related data recorded for the day downloaded. If the section is empty, an array header with noOfRecords = 0 is sent. | ||
| [F2 GNSS positions of the vehicle when the accumulated driving time of the vehicle reaches a multiple of three hours. If the section is empty, an array header with noOfRecords = 0 is sent.] | ||
| Specific conditions data recorded for the day downloaded. If the section is empty, an array header with noOfRecords =0 is sent | ||
| ECC signature of all preceding data. | ||
| [F2Data structure generation 1 (TREP 03 Hex)] | ||
| Data element | Comment | |
|---|---|---|
All faults stored or on-going in the VU. If the section is empty, only noOfVuFaults = 0 is sent. | ||
All events (except over speeding) stored or on-going in the VU. If the section is empty, only noOfVuEvents = 0 is sent. | ||
| Data related to last over speeding control (default value if no data). | ||
All over speeding events stored in the VU. If the section is empty, only noOfVuOverSpeedingEvents = 0 is sent. | ||
All time adjustment events stored in the VU (outside the frame of a full calibration). If the section is empty, only noOfVuTimeAdjRecords = 0 is sent. | ||
| RSA signature of all data starting from noOfVuFaults down to last byte of last time adjustment record | ||
| [F2Data structure generation 2 (TREP 23 Hex)] | ||
| Data element | Comment | |
|---|---|---|
All faults stored or on-going in the VU. If the section is empty, an array header with noOfRecords = 0 is sent. | ||
All events (except over speeding) stored or on-going in the VU. If the section is empty, an array header with noOfRecords = 0 is sent. | ||
| Data related to last over speeding control (default value if no data). | ||
All over speeding events stored in the VU. If the section is empty, an array header with noOfRecords = 0 is sent. | ||
All time adjustment events stored in the VU (outside the frame of a full calibration). If the section is empty, an array header with noOfRecords = 0 is sent. | ||
| F25 | ||
| ECC signature of all preceding data. | ||
Textual Amendments
| [F2Data structure generation 1 (TREP 04)] | ||
| Data element | Comment | |
|---|---|---|
All detailed speed stored in the VU (one speed block per minute during which the vehicle has been moving) 60 speed values per minute (one per second). | ||
| RSA signature of all data starting from noOfSpeedBlocks down to last byte of last speed block. | ||
| [F2Data structure generation 2 (TREP 24)] | ||
| Data element | Comment | |
|---|---|---|
All detailed speed stored in the VU (one speed block per minute during which the vehicle has been moving) 60 speed values per minute (one per second). | ||
| ECC signature of all preceding data. | ||
| [F2Data structure generation 1 (TREP 05)] | ||
| Data element | Comment | |
|---|---|---|
| All calibration records stored in the VU. | ||
| RSA signature of all data starting from vuManufacturerName down to last byte of last VuCalibrationRecord. | ||
| [F2Data structure generation 2 (TREP 25)] | ||
| Data element | Comment | |
|---|---|---|
| All MS pairings stored in the VU | ||
| All external GNSS facility couplings stored in the VU | ||
| All calibration records stored in the VU. | ||
| All card insertion data stored in the VU. | ||
| ECC signature of all preceding data. | ||
This paragraph describes the direct card data downloading of a tachograph card to an IDE. The IDE is not part of the secure environment; therefore no authentication between the card and the IDE is performed.
:
Each time a download of the ICC data is performed. The session covers the complete procedure from the reset of the ICC by an IFD until the deactivation of the ICC (withdraw of the card or next reset).
:
A file from the ICC. The file is transferred to the IFD in plain text. On the ICC the file is hashed and signed and the signature is transferred to the IFD.
Download the common information of the card in the EFs and
This information is optional and is not secured with a digital signature.
(for first and second generation tachograph cards) Download EFs within :
Download the EFs and
This information is not secured with a digital signature.
It is mandatory to download these files for each download session.
Download the other application data EFs (within ) except EF
. This information is secured with a digital signature, using Appendix 11 Common Security Mechanisms Part A.
It is mandatory to download at least the EFs and
for each download session.
When downloading a driver card it is also mandatory to download the following EFs:
(for second generation tacograph cards only) Except when a download of a driver card inserted in a VU is performed during drivers' control by a non EU control authority, using a first generation control card, download EFs within :
Download the EFs CardSignCertificate, CA_Certificate and Link_Certificate (if present). This information is not secured with a digital signature.
It is mandatory to download these files for each download session.
Download the other application data EFs (within ) except EF
. This information is secured with a digital signature, using Appendix 11 Common Security Mechanisms Part B.
It is mandatory to download at least the EFs and
for each download session.
When downloading a driver card it is also mandatory to download the following EFs:
When downloading a driver card, update the date in EF
, in the
and, if applicable,
DFs.
When downloading a workshop card, reset the calibration counter in EF in the
and, if applicable,
DFs.
When downloading a workshop card the EF in the
and, if applicable,
DFs shall not be downloaded.]
| Card | Direction | IDE/IFD | Meaning/Remarks |
|---|---|---|---|
| ⇦ | Hardware reset | ||
| ATR | ⇨ |
It is optional to use PPS to switch to a higher baud rate as long as the ICC supports it.
| Card | Direction | IDE/IFD | Meaning/Remarks |
|---|---|---|---|
| ⇦ | Select File | Select by File identifiers | |
| OK | ⇨ | ||
| ⇦ | Read Binary | If the file contains more data than the buffer size of the reader or the card the command has to be repeated until the complete file is read. | |
File Data OK | ⇨ | Store data to ESM | according to 3.4 Data storage format |
Note 1: Before selecting the Card_Certificate (or CardSignCertificate) EF, the Tachograph Application must be selected (selection by AID).U.K.
Note 2: Selecting and reading a file may also be performed in one step using a Read Binary command with a short EF identifier.U.K.
| [F2Card | Dir | IDE / IFD | Meaning / Remarks |
|---|---|---|---|
| Select File | |||
| OK | |||
| Perform Hash of File | — Calculates the hash value over the data content of the selected file using the prescribed hash algorithm in accordance with Appendix 11, part A or B. This command is not an ISO-Command. | ||
| Calculate Hash of File and store Hash value temporarily | |||
| OK | |||
| Read Binary | If the file contains more data than the buffer of the reader or the card can hold, the command has to be repeated until the complete file is read. | ||
File Data OK | Store received data to ESM | according to 3.4 Data storage format | |
| PSO: Compute Digital Signature | |||
| Perform Security Operation ‘ Compute Digital Signature ’ using the temporarily stored Hash value | |||
Signature OK | Append data to the previous stored data on the ESM | according to 3.4 Data storage format] |
Note: Selecting and reading a file may also be performed in one step using a Read Binary command with a short EF identifier. In this case the EF may be selected and read before the command Perform Hash of File is applied.U.K.
| Card | Dir | IDE/IFD | Meaning/Remarks |
|---|---|---|---|
| ⇦ | Select File EF Card_Download | Select by File identifiers | |
| OK | ⇨ | ||
| ⇦ | Update Binary NoOfCalibrationsSinceDownload = ‘00 00’ | ||
| resets card download number | |||
| OK | ⇨ |
Note: Selecting and updating a file may also be performed in one step using an Update Binary command with a short EF identifier.U.K.
The data shall be stored transparent. This means that the order of the bytes as well as the order of the bits inside the byte that are transferred from the card has to be preserved during storage.
All files of the card downloaded within a download session are stored in one file on the ESM.
Example of data in a download file on an ESM:
Second generation driver cards: the VU shall then download the whole card, file by file, in accordance with the card downloading protocol defined in paragraph 3, and forward all data received from the card to the IDE within the appropriate TLV file format (see 3.4.2) and encapsulated within a ‘Positive Response Transfer Data’ message.]
This appendix describes how data is exchanged between a vehicle unit and a tester via the K-line which forms part of the calibration interface described in Appendix 6. It also describes control of the input/output signal line on the calibration connector.
Establishing K-line communications is described in Section 4 ‘Communication Services’.
This appendix uses the idea of diagnostic ‘sessions’ to determine the scope of K-line control under different conditions. The default session is the ‘StandardDiagnosticSession’ where all data can be read from a vehicle unit but no data can be written to a vehicle unit.
Selection of the diagnostic session is described in Section 5 ‘Management Services’.
This appendix has to be considered as relevant for both generations of VUs and of workshop cards, in compliance with the interoperability requirements laid down in this Regulation.
Data transfer via K-line is described in Section 6 ‘Data Transmission Services’. Formats of data transferred are detailed in Section 8 ‘dataRecords formats’.
The protocols, messages and error codes are principally based on a draft of ISO 14229-1 (Road vehicles — Diagnostic systems — Part 1: Diagnostic services, version 6 of 22 February 2001).
Byte encoding and hexadecimal values are used for the service identifiers, the service requests and responses, and the standard parameters.
The term ‘tester’ refers to the equipment used to enter programming/calibration data into the VU.
The terms ‘client’ and ‘server’ refer to the tester and the VU respectively.
The term ECU means ‘Electronic Control Unit’ and refers to the VU.
[F2ISO 14230-2: Road Vehicles -Diagnostic Systems — Keyword Protocol 2000- Part 2: Data Link Layer.
First edition: 1999.]
The following table provides an overview of the services that will be available in the tachograph and are defined in this document.
The 1st column lists the services that are available.
The 2nd column includes the section number in this appendix where of service is further defined.
The 3rd column assigns the service identifier values for request messages.
The 4th column specifies the services of the ‘StandardDiagnosticSession’ (SD) which must be implemented in each VU.
The 5th column specifies the services of the ‘ECUAdjustmentSession’ (ECUAS) which must be implemented to allow control of the I/O signal line in the front panel calibration connector of the VU.
The 6th column specifies the services of the ‘ECUProgrammingSession’ (ECUPS) which must be implemented to allow for programming of parameters in the VU.
Service Identifier value summary table
■ This symbol indicates that the service is mandatory in this diagnostic session. No symbol indicates that this service is not allowed in this diagnostic session. | |||||
| Diagnostic Sessions | |||||
|---|---|---|---|---|---|
| Diagnostic Service Name | Section No. | SId Req.Value | SD | ECUAS | ECUPS |
| StartCommunication | 4.1 | 81 | ■ | ■ | ■ |
| StopCommunication | 4.2 | 82 | ■ | ||
| TesterPresent | 4.3 | 3E | ■ | ■ | ■ |
| StartDiagnosticSession | 5.1 | 10 | ■ | ■ | ■ |
| SecurityAccess | 5.2 | 27 | ■ | ■ | ■ |
| ReadDataByIdentifier | 6.1 | 22 | ■ | ■ | ■ |
| WriteDataByIdentifier | 6.2 | 2E | ■ | ||
| InputOutputControlByIdentifier | 7.1 | 2F | ■ | ||
Response codes are defined for each service.
Some services are necessary to establish and maintain communication. They do not appear on the application layer. The services available are detailed in the following table:
Communication Services
| Service name | Description |
|---|---|
| StartCommunication | The client requests to start a communication session with a server(s). |
| StopCommunication | The client requests to stop the current communication session. |
| TesterPresent | The client indicates to the server that it is still present. |
There is a bus-idle time prior to any activity.
The tester then sends an initialisation pattern.
All information which is necessary to establish communication is contained in the response of the VU.
All communication parameters are set to values defined in Table 4 according to the key bytes.
The VU is waiting for the first request of the tester.
The VU is in the default diagnostic mode, i.e. StandardDiagnosticSession.
The calibration I/O signal line is in the default state, i.e. disabled state.
First transmission after power on, Tidle = 300 ms.
After completion of a StopCommunication Service, Tidle = P3 min.
After stopping communication by time-out P3 max, Tidle = 0.
| Table 3 | |||
| Timing values for fast initialisation | |||
| Parameter | min value | max value | |
|---|---|---|---|
| Tinil | 25 ± 1 ms | 24 ms | 26 ms |
| Twup | 50 ± 1 ms | 49 ms | 51 ms |
| Table 4 | |||
| Communication timing values | |||
| Timing Parameter | Parameter Description | lower limit values [ms] | upper limit values [ms] |
|---|---|---|---|
| min. | max. | ||
| P1 | Inter byte time for VU response | 0 | 20 |
| P2 | Time between tester request and VU response or two VU responses | 25 | 250 |
| P3 | Time between end of VU responses and start of new tester request | 55 | 5 000 |
| P4 | Inter byte time for tester request | 5 | 20 |
| Table 5 | |||
| StartCommunication Request Message | |||
| Byte # | Parameter Name | Hex Value | Mnemonic |
|---|---|---|---|
| #1 | Format byte — physical addressing | 81 | FMT |
| #2 | Target address byte | EE | TGT |
| #3 | Source address byte | tt | SRC |
| #4 | StartCommunication Request Service Id | 81 | SCR |
| #5 | Checksum | 00-FF | CS |
| Table 6 | |||
| StartCommunication Positive Response Message | |||
| Byte # | Parameter Name | Hex Value | Mnemonic |
|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT |
| #2 | Target address byte | tt | TGT |
| #3 | Source address byte | EE | SRC |
| #4 | Additional length byte | 03 | LEN |
| #5 | StartCommunication Positive Response Service Id | C1 | SCRPR |
| #6 | Key byte 1 | EA | KB1 |
| #7 | Key byte 2 | 8F | KB2 |
| #8 | Checksum | 00-FF | CS |
The purpose of this communication layer service is to terminate a communication session.
| Table 7 | |||
| StopCommunication Request Message | |||
| Byte # | Parameter Name | Hex Value | Mnemonic |
|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT |
| #2 | Target address byte | EE | TGT |
| #3 | Source address byte | tt | SRC |
| #4 | Additional length byte | 01 | LEN |
| #5 | StopCommunication Request Service Id | 82 | SPR |
| #6 | Checksum | 00-FF | CS |
| Table 8 | |||
| StopCommunication Positive Response Message | |||
| Byte # | Parameter Name | Hex Value | Mnemonic |
|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT |
| #2 | Target address byte | tt | TGT |
| #3 | Source address byte | EE | SRC |
| #4 | Additional length byte | 01 | LEN |
| #5 | StopCommunication Positive Response Service Id | C2 | SPRPR |
| #6 | Checksum | 00-FF | CS |
| Table 9 | |||
| StopCommunication Negative Response Message | |||
| Byte # | Parameter Name | Hex Value | Mnemonic |
|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT |
| #2 | Target address byte | tt | TGT |
| #3 | Source address byte | EE | SRC |
| #4 | Additional length byte | 03 | LEN |
| #5 | negative Response Service Id | 7F | NR |
| #6 | StopCommunication Request Service Identification | 82 | SPR |
| #7 | responseCode = generalReject | 10 | RC_GR |
| #8 | Checksum | 00-FF | CS |
This service does not require any parameter definition.
The TesterPresent service is used by the tester to indicate to the server that it is still present, in order to prevent the server from automatically returning to normal operation and possibly stopping the communication. This service, sent periodically, keeps the diagnostic session/communication active by resetting the P3 timer each time a request for this service is received.
| Table 10 | ||||
| TesterPresent Request Message | ||||
| Byte # | Parameter Name | Hex Value | Mnemonic | |
|---|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT | |
| #2 | Target address byte | EE | TGT | |
| #3 | Source address byte | tt | SRC | |
| #4 | Additional length byte | 02 | LEN | |
| #5 | TesterPresent Request Service Id | 3E | TP | |
| #6 | Sub Function = responseRequired = | [ yes | 01 | RESPREQ_Y |
| no ] | 02 | RESPREQ_NO | ||
| #7 | Checksum | 00-FF | CS | |
| Table 11 | |||
| TesterPresent Positive Response Message | |||
| Byte # | Parameter Name | Hex Value | Mnemonic |
|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT |
| #2 | Target address byte | tt | TGT |
| #3 | Source address byte | EE | SRC |
| #4 | Additional length byte | 01 | LEN |
| #5 | TesterPresent Positive Response Service Id | 7E | TPPR |
| #6 | Checksum | 00-FF | CS |
| Table 12 | ||||
| TesterPresent Negative Response Message | ||||
| Byte # | Parameter Name | Hex Value | Mnemonic | |
|---|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT | |
| #2 | Target address byte | tt | TGT | |
| #3 | Source address byte | EE | SRC | |
| #4 | Additional length byte | 03 | LEN | |
| #5 | negative Response Service Id | 7F | NR | |
| #6 | TesterPresent Request Service Identification | 3E | TP | |
| #7 | responseCode = | [SubFunctionNotSupported-InvalidFormat | 12 | RC_SFNS_IF |
| incorrectMessageLength] | 13 | RC_IML | ||
| #8 | Checksum | 00-FF | CS | |
The services available are detailed in the following table:
Management Services
| Service name | Description |
|---|---|
| StartDiagnosticSession | The client requests to start a diagnostic session with a VU. |
| SecurityAccess | The client requests access to functions restricted to authorised users. |
There shall be always exactly one diagnostic session active in the VU,
The VU shall always start the StandardDiagnosticSession when powered up. If no other diagnostic session is started, then the StandardDiagnosticSession shall be running as long as the VU is powered,
If a diagnostic session which is already running has been requested by the tester, then the VU shall send a positive response message,
Whenever the tester requests a new diagnostic session, the VU shall first send a StartDiagnosticSession positive response message before the new session becomes active in the VU. If the VU is not able to start the requested new diagnostic session, then it shall respond with a StartDiagnosticSession negative response message, and the current session shall continue.
| Table 14 | |||
| StartDiagnosticSession Request Message | |||
| Byte # | Parameter Name | Hex Value | Mnemonic |
|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT |
| #2 | Target address byte | EE | TGT |
| #3 | Source address byte | tt | SRC |
| #4 | Additional length byte | 02 | LEN |
| #5 | StartDiagnosticSession Request Service Id | 10 | STDS |
| #6 | diagnosticSession = [one value from Table 17] | xx | DS_… |
| #7 | Checksum | 00-FF | CS |
| Table 15 | |||
| StartDiagnosticSession Positive Response Message | |||
| Byte # | Parameter Name | Hex Value | Mnemonic |
|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT |
| #2 | Target address byte | tt | TGT |
| #3 | Source address byte | EE | SRC |
| #4 | Additional length byte | 02 | LEN |
| #5 | StartDiagnosticSession Positive Response Service Id | 50 | STDSPR |
| #6 | diagnosticSession = [same value as in byte #6 Table 14] | xx | DS_… |
| #7 | Checksum | 00-FF | CS |
| Table 16 | ||||
| StartDiagnosticSession Negative Response Message | ||||
a – the value inserted in byte #6 of the request message is not supported, i.e. not in Table 17, | ||||
b – the length of the message is wrong, | ||||
c – the criteria for the request StartDiagnosticSession are not met. | ||||
| Byte # | Parameter Name | Hex Value | Mnemonic | |
|---|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT | |
| #2 | Target address byte | tt | TGT | |
| #3 | Source address byte | EE | SRC | |
| #4 | Additional length byte | 03 | LEN | |
| #5 | Negative Response Service Id | 7F | NR | |
| #6 | StartDiagnosticSession Request Service Id | 10 | STDS | |
| #7 | ResponseCode = | [subFunctionNotSupporteda | 12 | RC_SFNS |
| incorrectMessageLengthb | 13 | RC_IML | ||
| conditionsNotCorrectc | 22 | RC_CNC | ||
| #8 | Checksum | 00-FF | CS | |
Writing of calibration data is not possible unless the VU is in CALIBRATION mode. In addition to insertion of a valid workshop card into the VU, it is necessary to enter the appropriate PIN into the VU before access to the CALIBRATION mode is granted.
When the VU is in CALIBRATION or CONTROL mode, access to the calibration input/output line is also possible.
The SecurityAccess service provides a means to enter the PIN and to indicate to the tester whether or not the VU is in CALIBRATION mode.
It is acceptable that the PIN may be entered through alternative methods.
The SecurityAccess service consists of a SecurityAccess ‘requestSeed’ message, eventually followed by a SecurityAccess ‘sendKey’ message. The SecurityAccess service must be carried out after the StartDiagnosticSession service.
subFunctionNot supported: Invalid format for the subfunction parameter (accessType),
conditionsNotCorrectOrRequestSequenceError: Vehicle unit not ready to accept a PIN entry,
invalidKey: PIN not valid and number of PIN checks attempts not exceeded,
exceededNumberOfAttempts: PIN not valid and number of PIN checks attempts exceeded,
generalReject: Correct PIN but mutual authentication with workshop card failed.
SecurityAccess Request- requestSeed Message
| Byte # | Parameter Name | Hex Value | Mnemonic |
|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT |
| #2 | Target address byte | EE | TGT |
| #3 | Source address byte | tt | SRC |
| #4 | Additional length byte | 02 | LEN |
| #5 | SecurityAccess Request Service Id | 27 | SA |
| #6 | accessType — requestSeed | 7D | AT_RSD |
| #7 | Checksum | 00-FF | CS |
SecurityAccess — requestSeed Positive Response Message
| Byte # | Parameter Name | Hex Value | Mnemonic |
|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT |
| #2 | Target address byte | tt | TGT |
| #3 | Source address byte | EE | SRC |
| #4 | Additional length byte | 04 | LEN |
| #5 | SecurityAccess Positive Response Service Id | 67 | SAPR |
| #6 | accessType — requestSeed | 7D | AT_RSD |
| #7 | Seed High | 00-FF | SEEDH |
| #8 | Seed Low | 00-FF | SEEDL |
| #9 | Checksum | 00-FF | CS |
SecurityAccess Negative Response Message
| Byte # | Parameter Name | Hex Value | Mnemonic | |
|---|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT | |
| #2 | Target address byte | tt | TGT | |
| #3 | Source address byte | EE | SRC | |
| #4 | Additional length byte | 03 | LEN | |
| #5 | negativeResponse Service Id | 7F | NR | |
| #6 | SecurityAccess Request Service Id | 27 | SA | |
| #7 | responseCode = | [conditionsNotCorrectOrRequestSequenceError | 22 | RC_CNC |
| incorrectMessageLength] | 13 | RC_IML | ||
| #8 | Checksum | 00-FF | CS | |
SecurityAccess Request — sendKey Message
| Byte # | Parameter Name | Hex Value | Mnemonic |
|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT |
| #2 | Target address byte | EE | TGT |
| #3 | Source address byte | tt | SRC |
| #4 | Additional length byte | m+2 | LEN |
| #5 | SecurityAccess Request Service Id | 27 | SA |
| #6 | accessType — sendKey | 7E | AT_SK |
| #7 to #m + 6 | Key #1 (High) | xx | KEY |
| … | … | ||
| Key #m (low, m must be a minimum of 4, and a maximum of 8) | xx | ||
| #m + 7 | Checksum | 00-FF | CS |
SecurityAccess — sendKey Positive Response Message
| Byte # | Parameter Name | Hex Value | Mnemonic |
|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT |
| #2 | Target address byte | tt | TGT |
| #3 | Source address byte | EE | SRC |
| #4 | Additional length byte | 02 | LEN |
| #5 | SecurityAccess Positive Response Service Id | 67 | SAPR |
| #6 | accessType — sendKey | 7E | AT_SK |
| #7 | Checksum | 00-FF | CS |
SecurityAccess Negative Response Message
| Byte # | Parameter Name | Hex Value | Mnemonic | |
|---|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT | |
| #2 | Target address byte | tt | TGT | |
| #3 | Source address byte | EE | SRC | |
| #4 | Additional length byte | 03 | LEN | |
| #5 | NegativeResponse Service Id | 7F | NR | |
| #6 | SecurityAccess Request Service Id | 27 | SA | |
| #7 | ResponseCode = | [generalReject | 10 | RC_GR |
| subFunctionNotSupported | 12 | RC_SFNS | ||
| incorrectMessageLength | 13 | RC_IML | ||
| conditionsNotCorrectOrRequestSequenceError | 22 | RC_CNC | ||
| invalidKey | 35 | RC_IK | ||
| exceededNumberOfAttempts | 36 | RC_ENA | ||
| requestCorrectlyReceived-ResponsePending] | 78 | RC_RCR_RP | ||
| #8 | Checksum | 00-FF | CS | |
The services available are detailed in the following table:
Data Transmission Services
| Service name | Description |
|---|---|
| ReadDataByIdentifier | The client requests the transmission of the current value of a record with access by recordDataIdentifier. |
| WriteDataByIdentifier | The client requests to write a record accessed by recordDataIdentifier. |
| Table 25 | |||
| ReadDataByIdentifier Request Message | |||
| Byte # | Parameter Name | Hex Value | Mnemonic |
|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT |
| #2 | Target address byte | EE | TGT |
| #3 | Source address byte | tt | SRC |
| #4 | Additional length byte | 03 | LEN |
| #5 | ReadDataByIdentifier Request Service Id | 22 | RDBI |
| #6 to #7 | recordDataIdentifier = [a value fromTable 28] | xxxx | RDI_… |
| #8 | Checksum | 00-FF | CS |
| Table 26 | ||||
| ReadDataByIdentifier Positive Response Message | ||||
| Byte # | Parameter Name | Hex Value | Mnemonic | |
|---|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT | |
| #2 | Target address byte | tt | TGT | |
| #3 | Source address byte | EE | SRC | |
| #4 | Additional length byte | m+3 | LEN | |
| #5 | ReadDataByIdentifier Positive Response Service Id | 62 | RDBIPR | |
| #6 and #7 | recordDataIdentifier = [the same value as bytes #6 and #7 Table 25] | xxxx | RDI_... | |
| #8 to #m + 7 | dataRecord[] = | [data#1 | xx | DREC_DATA1 |
| : | : | : | ||
| data#m] | xx | DREC_DATAm | ||
| #m + 8 | Checksum | 00-FF | CS | |
| Table 27 | ||||
| ReadDataByIdentifier Negative Response Message | ||||
| Byte # | Parameter Name | Hex Value | Mnemonic | |
|---|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT | |
| #2 | Target address byte | tt | TGT | |
| #3 | Source address byte | EE | SRC | |
| #4 | Additional length byte | 03 | LEN | |
| #5 | NegativeResponse Service Id | 7F | NR | |
| #6 | ReadDataByIdentifier Request Service Id | 22 | RDBI | |
| #7 | ResponseCode= | [requestOutOfRange | 31 | RC_ROOR |
| incorrectMessageLength | 13 | RC_IML | ||
| conditionsNotCorrect] | 22 | RC_CNC | ||
| #8 | Checksum | 00-FF | CS | |
The recordDataIdentifier table consists of four columns and multiple lines.
The 1st column (Hex) includes the ‘Hex Value’ assigned to the recordDataIdentifier specified in the 3rd column.
The 2nd column (Data element) specifies the data element of Appendix 1 on which the recordDataIdentifier is based (transcoding is sometimes necessary).
The 3rd column (Description) specifies the corresponding recordDataIdentifier name.
The 4th column (Mnemonic) specifies the mnemonic of this recordDataIdentifier.
WriteDataByIdentifier Request Message
| Byte # | Parameter Name | Hex Value | Mnemonic | |
|---|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT | |
| #2 | Target address byte | EE | TGT | |
| #3 | Source address byte | tt | SRC | |
| #4 | Additional length byte | m + 3 | LEN | |
| #5 | WriteDataByIdentifier Request Service Id | 2E | WDBI | |
| #6 to #7 | recordDataIdentifier = [a value from Table 28] | xxxx | RDI_… | |
| #8 to m + 7 | dataRecord[] = | [data#1 | xx | DREC_DATA1 |
| : | : | : | ||
| data#m] | xx | DREC_DATAm | ||
| #m + 8 | Checksum | 00-FF | CS | |
WriteDataByIdentifier Positive Response Message
| Byte # | Parameter Name | Hex Value | Mnemonic |
|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT |
| #2 | Target address byte | tt | TGT |
| #3 | Source address byte | EE | SRC |
| #4 | Additional length byte | 03 | LEN |
| #5 | WriteDataByIdentifier Positive Response Service Id | 6E | WDBIPR |
| #6 to #7 | recordDataIdentifier = [the same value as bytes #6 and #7 Table 29] | xxxx | RDI_… |
| #8 | Checksum | 00-FF | CS |
WriteDataByIdentifier Negative Response Message
| Byte # | Parameter Name | Hex Value | Mnemonic | |
|---|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT | |
| #2 | Target address byte | tt | TGT | |
| #3 | Source address byte | EE | SRC | |
| #4 | Additional length byte | 03 | LEN | |
| #5 | NegativeResponse Service Id | 7F | NR | |
| #6 | WriteDataByIdentifier Request Service Id | 2E | WDBI | |
| #7 | ResponseCode= | [requestOutOfRange | 31 | RC_ROOR |
| incorrectMessageLength | 13 | RC_IML | ||
| conditionsNotCorrect] | 22 | RC_CNC | ||
| #8 | Checksum | 00-FF | CS | |
The parameter recordDataIdentifier (RDI_) is defined in Table 28.
The parameter dataRecord (DREC_) is used by the WriteDataByIdentifier request message to provide the data record values identified by the recordDataIdentifier to the server (VU). Data formats are specified in section 8.
The services available are detailed in the following table:
Input/Output Control functional unit
| Service name | Description |
|---|---|
| InputOutputControlByIdentifier | The client requests the control of an input/output specific to the server. |
There is a connection via the front connector which allows test pulses to be controlled or monitored using a suitable tester.
disabled,
speedSignalInput, where the calibration I/O signal line is used to input a speed signal (test signal) replacing the motion sensor speed signal, this function is not available in CONTROL mode,
realTimeSpeedSignalOutputSensor, where the calibration I/O signal line is used to output the speed signal of the motion sensor,
RTCOutput, where the calibration I/O signal line is used to output the UTC clock signal, this function is not available in CONTROL mode.
Establish communications by StartCommunication Service
Enter an adjustment session by StartDiagnosticSession Service and be in CALIBRATION or CONTROL mode of operation (the order of these two operation is not important).
Change the state of the output by InputOutputControlByIdentifier Service.
| Table 33 | |||
| InputOutputControlByIdentifier Request Message | |||
| Byte # | Parameter Name | Hex Value | Mnemonic |
|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT |
| #2 | Target address byte | EE | TGT |
| #3 | Source address byte | tt | SRC |
| #4 | Additional length byte | xx | LEN |
| #5 | InputOutputControlByIdentifier Request Sid | 2F | IOCBI |
| #6 and #7 | InputOutputIdentifier = [CalibrationInputOutput] | F960 | IOI_CIO |
#8 or #8 to #9 | ControlOptionRecord = [ | COR_… | |
| inputOutputControlParameter — one value from Table 36 | xx | IOCP_… | |
| controlState — one value from Table 37 (see note below)] | xx | CS_… | |
| #9 or #10 | Checksum | 00-FF | CS |
Note: The controlState parameter is present only in some cases (see 7.1.3).U.K.
InputOutputControlByIdentifier Positive Response Message
| Byte # | Parameter Name | Hex Value | Mnemonic |
|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT |
| #2 | Target address byte | tt | TGT |
| #3 | Source address byte | EE | SRC |
| #4 | Additional length byte | xx | LEN |
| #5 | inputOutputControlByIdentifier Positive Response SId | 6F | IOCBIPR |
| #6 and #7 | inputOutputIdentifier = [CalibrationInputOutput] | F960 | IOI_CIO |
#8 or #8 to #9 | controlStatusRecord = [ | CSR_ | |
| inputOutputControlParameter (same value as byte #8 Table 33) | xx | IOCP_… | |
| controlState (same value as byte #9 Table 33)] (if applicable) | xx | CS_… | |
| #9 or #10 | Checksum | 00-FF | CS |
InputOutputControlByIdentifier Negative Response Message
| Byte # | Parameter Name | Hex Value | Mnemonic |
|---|---|---|---|
| #1 | Format byte — physical addressing | 80 | FMT |
| #2 | Target address byte | tt | TGT |
| #3 | Source address byte | EE | SRC |
| #4 | Additional length byte | 03 | LEN |
| #5 | negativeResponse Service Id | 7F | NR |
| #6 | inputOutputControlByIdentifier Request SId | 2F | IOCBI |
| #7 | responseCode=[ | ||
| incorrectMessageLength | 13 | RC_IML | |
| conditionsNotCorrect | 22 | RC_CNC | |
| requestOutOfRange | 31 | RC_ROOR | |
| deviceControlLimitsExceeded] | 7A | RC_DCLE | |
| #8 | Checksum | 00-FF | CS |
| Table 37 | ||
| Definition of controlState values | ||
| Mode | Hex Value | Description |
|---|---|---|
| Disable | 00 | I/O line is disabled (default state) |
| Enable | 01 | Enable calibration I/O line as speedSignalInput |
| Enable | 02 | Enable calibration I/O line as realTimeSpeedSignalOutputSensor |
| Enable | 03 | Enable calibration I/O line as RTCOutput |
This section details:
general rules that shall be applied to ranges of parameters transmitted by the vehicle unit to the tester,
formats that shall be used for data transferred via the Data Transmission Services described in section 6.
| Table 38 | ||||
| dataRecords ranges | ||||
| Range Name | 1 byte(Hex value) | 2 bytes(Hex value) | 4 bytes(Hex Value) | ASCII |
|---|---|---|---|---|
| Valid signal | 00 to FA | 0000 to FAFF | 00000000 to FAFFFFFF | 1 to 254 |
| Parameter specific indicator | FB | FB00 to FBFF | FB000000 to FBFFFFFF | none |
| Reserved range for future indicator bits | FC to FD | FC00 to FDFF | FC000000 to FDFFFFFF | none |
| Error indicator | FE | FE00 to FEFF | FE000000 to FEFFFFFF | 0 |
| Not available or not requested | FF | FF00 to FFFF | FF000000 to FFFFFFFF | FF |
Table 39 to Table 42 below detail the formats that shall be used via the ReadDataByIdentifier and WriteDataByIdentifier Services.
| Table 39 | |||
| Format of dataRecords | |||
| Parameter Name | Data length (bytes) | Resolution | Operating range |
|---|---|---|---|
| TimeDate | 8 | See details in Table 40 | |
| HighResolutionTotalVehicleDistance | 4 | 5 m/bit gain, 0 m offset | 0 to + 21 055 406 km |
| Kfactor | 2 | 0,001 pulse/m/bit gain, 0 offset | 0 to 64,255 pulse/m |
| LfactorTyreCircumference | 2 | 0,125 10– 3 m/bit gain, 0 offset | 0 to 8,031 m |
| WvehicleCharacteristicFactor | 2 | 0,001 pulse/m/bit gain, 0 offset | 0 to 64,255 pulse/m |
| TyreSize | 15 | ASCII | ASCII |
| NextCalibrationDate | 3 | See details in Table 41 | |
| SpeedAuthorised | 2 | 1/256 km/h/bit gain, 0 offset | 0 to 250,996 km/h |
| RegisteringMemberState | 3 | ASCII | ASCII |
| VehicleRegistrationNumber | 14 | See details in Table 42 | |
| VIN | 17 | ASCII | ASCII |
| Table 40 | |||
| Detailed format of TimeDate (recordDataIdentifier value # F90B) | |||
| Byte | Parameter definition | Resolution | Operating range |
|---|---|---|---|
| 1 | Seconds | 0,25 s/bit gain, 0 s offset | 0 to 59,75 s |
| 2 | Minutes | 1 min/bit gain, 0 min offset | 0 to 59 min |
| 3 | Hours | 1 h/bit gain, 0 h offset | 0 to 23 h |
| 4 | Month | 1 month/bit gain, 0 month offset | 1 to 12 month |
| 5 | Day | 0,25 day/bit gain, 0 day offset (see NOTE below Table 41) | 0,25 to 31,75 day |
| 6 | Year | 1 year/bit gain, + 1985 year offset (see NOTE below Table 41) | 1985 to 2235 year |
| 7 | Local Minute Offset | 1 min/bit gain, – 125 min offset | – 59 to + 59 min |
| 8 | Local Hour Offset | 1 h/bit gain, – 125 h offset | – 23 to + 23 h |
| Table 41 | |||
| Detailed format of NextCalibrationDate (recordDataIdentifier value # F922) | |||
| Byte | Parameter definition | Resolution | Operating range |
|---|---|---|---|
| 1 | Month | 1 month/bit gain, 0 month offset | 1 to 12 month |
| 2 | Day | 0,25 day/bit gain, 0 day offset (see NOTE below) | 0,25 to 31,75 day |
| 3 | Year | 1 year/bit gain, + 1985 year offset (see NOTE below) | 1985 to 2235 year |
NOTE concerning the use of the ‘Day’ parameter:U.K.
A value of 0 for the date is null. The values 1, 2, 3, and 4 are used to identify the first day of the month; 5, 6, 7, and 8 identify the second day of the month; etc.
This parameter does not influence or change the hours parameter above.
NOTE concerning the use of byte ‘Year’ parameter:U.K.
A value of 0 for the year identifies the year 1985; a value of 1 identifies 1986; etc.
| Table 42 | |||
| Detailed format of VehicleRegistrationNumber (recordDataIdentifier value # F97E) | |||
| Byte | Parameter definition | Resolution | Operating range |
|---|---|---|---|
| 1 | Code Page (as defined in Appendix 1) | ASCII | 01 to 0A |
| 2 - 14 | Vehicle Registration Number (as defined in Appendix 1) | ASCII | ASCII |
The EC type approval for a recording equipment (or component) or a tachograph card is based on:
[F2a security certification , based on Common Criteria specifications, against a security target fully compliant with Appendix 10 to this Annex,]
a functional certification performed by a Member State authority certifying that the item tested fulfils the requirements of this Annex in terms of functions performed, measurement accuracy and environmental characteristics,
an interoperability certification performed by the competent body certifying that the recording equipment (or tachograph card) is fully interoperable with the necessary tachograph card (or recording equipment) models (see Chapter 8 of this Annex).
This Appendix specifies which tests, as a minimum, must be performed by a Member State authority during the functional tests, and which tests, as a minimum, must be performed by the competent body during the interoperability tests. Procedures to follow to carry out the tests or the type of tests are not specified further.
The security certification aspects are not covered by this Appendix. If some tests requested for type approval are performed during the security evaluation and certification process, then these tests do not need to be performed again. In this case, only the results of these security tests may be inspected. For information, the requirements expected to be tested (or closely related to tests expected to be performed) during the security certification, are marked with a ‘*’ in this Appendix.
The numbered requirements refer to the Annex corpus, while the other requirements refer to the other appendixes (e.g. PIC_001 refers to requirement PIC_001 of Appendix 3 Pictograms).
This Appendix considers separately the type approval of the motion sensor, of the vehicle unit, and of the external GNSS facility as components of the recording equipment. Each component will get its own type approval certificate in which the other compatible components will be indicated. The functional test of the motion sensor (or external GNSS facility) is done together with the vehicle unit and vice versa.
Interoperability between every model of motion sensor (resp. external GNSS facility) and every model of vehicle unit is not required. In that case the type approval for a motion sensor (resp. external GNSS facility) can be granted only in combination with the type approval of the relevant vehicle unit and vice versa.
The following references are used in this Appendix:
Environmental testing — Part 2-1: Tests — Test A: Cold
Basic environmental testing procedures; part 2: tests; tests B: dry heat (sinusoidal).
Environmental testing — Part 2: Tests — Test Fc: Vibration
Environmental testing; Part 2-14: Tests; Test N: Change of temperature
Environmental testing. Part 2: Tests. Test Ea and guidance: Shock
Environmental testing — Part 2-30: Tests — Test Db: Damp heat, cyclic (12 h + 12 h cycle)
Environmental testing — Part 2-64: Tests — Test Fh: Vibration, broadband random and guidance
Environmental testing — Part 2-78: Tests — Test Cab: Damp heat, steady state
Mechanical loads (2012-12)
Climatic loads(2010-04).
Road vehicles — Degree of protection (IP code) — Protection of electrical equipment against foreign objects, water and access
Road vehicles — Test methods for electrical disturbances from electrostatic discharge
Road vehicles — Electrical disturbances from conduction and coupling — Part 1: Definitions and general considerations.
Road vehicles — Electrical disturbances from conduction and coupling — Part 2: Electrical transient conduction along supply lines only.
Road vehicles — Electrical disturbances from conduction and coupling — Part 3: Electrical transient transmission by capacitive and inductive coupling via lines other than supply lines.
Identification cards — Integrated circuit(s) cards with contacts — Part 1: Physical characteristics..
Information technology — Identification cards — Integrated circuit(s) cards with contacts — Part 2: Dimensions and location of the contacts.
Information technology — Identification cards — Integrated circuit(s) cards with contacts — Part 3: Electronic signals and transmission protocol.
Identification cards — Test methods — Part 1: General characteristics
Identification cards — Test methods — Part 3: Integrated circuit cards with contacts and related interface devices
Road vehicles — Tachograph systems — Part 3: Motion sensor interface (with vehicle units).
Road vehicles — Tachograph systems — Part 4: CAN interface
Road vehicles — Tachograph systems — Part 6: Diagnostics
Road vehicles — Tachograph systems — Part 7: Parameters
Paper and board — Determination of thickness, density and specific volume
Uniform provisions concerning the approval of vehicles with regard to electromagnetic compatibility (United Nation Economic Commission for Europe)
| [F2No | Test | Description | Related requirements |
|---|---|---|---|
| 1. | Administrative examination | ||
| 1.1 | Documentation | Correctness of documentation | |
| 1.2 | Manufacturer test results | Results of manufacturer test performed during integration. Paper demonstrations. | 88, 89,91 |
| 2. | Visual inspection | ||
| 2,1 | Compliance with documentation | ||
| 2.2 | Identification / markings | 224 to 226 | |
| 2.3 | Materials | 219 to 223 | |
| 2.4 | Sealing | 398, 401 to 405 | |
| 2.5 | External interfaces | ||
| 3. | Functional tests | ||
| 3.1 | Functions provided | 02, 03, 04, 05, 07, 382 | |
| 3.2 | Modes of operation | 09 to 11*, 134, 135 | |
| 3.3 | Functions and data access rights | 12* 13*, 382, 383, 386 to 389 | |
| 3.4 | Monitoring cards insertion and withdrawal | 15, 16, 17, 18, 19*, 20*, 134 | |
| 3.5 | Speed and distance measurement | 21 to 31 | |
| 3.6 | Time measurement (test performed at 20 °C) | 38 to 43 | |
| 3.7 | Monitoring driver activities | 44 to 53, 134 | |
| 3.8 | Monitoring driving status | 54, 55, 134 | |
| 3.9 | Manual entries | 56 to 62 | |
| 3.10 | Company locks management | 63 to 68 | |
| 3.11 | Monitoring control activities | 69, 70 | |
| 3.12 | Detection of events and/or faults | 71 to 88, 134 | |
| 3.13 | Equipment identification data | 93*, 94*, 97, 100 | |
| 3.14 | Driver card insertion and withdrawal data | 102* to 104* | |
| 3.15 | Driver activity data | 105* to 107* | |
| 3.16 | Places and positions data | 108* to 112* | |
| 3.17 | Odometer data | 113* to 115* | |
| 3.18 | Detailed speed data | 116* | |
| 3.19 | Events data | 117* | |
| 3.20 | Faults data | 118* | |
| 3.21 | Calibration data | 119* to 121* | |
| 3.22 | Time adjustment data | 124*, 125* | |
| 3.23 | Control activity data | 126*, 127* | |
| 3.24 | Company locks data | 128* | |
| 3.25 | Download activity data | 129* | |
| 3.26 | Specific conditions data | 130*, 131* | |
| 3.27 | Recording and storing on tachographs cards | 136, 137, 138*, 139*, 141*, 142, 143 144, 145, 146*, 147*, 148*, 149, 150 | |
| 3.28 | Displaying | 90, 134, 151 to 168, PIC_001, DIS_001 | |
| 3.29 | Printing | 90, 134, 169 to 181, PIC_001, PRT_001 to PRT_014 | |
| 3.30 | Warning | 134, 182 to 191, PIC_001 | |
| 3.31 | Data downloading to external media | 90, 134, 192 to 196 | |
| 3.32 | Remote communication for targeted roadside checks | 197 to 199 | |
| 3.33 | Output data to additional external devices | 200, 201 | |
| 3.34 | Calibration | 202 to 206*, 383, 384, 386 to 391 | |
| 3.35 | Roadside calibration checking | 207 to 209 | |
| 3.36 | Time adjustment | 210 to 212* | |
| 3.37 | Non-interference of additional functions | 06, 425 | |
| 3.38 | Motion sensor interface | 02, 122 | |
| 3.39 | External GNSS facility | 03, 123 | |
| 3.40 | Verify that the VU detects, records and stores the event(s) and/or fault(s) defined by the VU manufacturer when a paired motion sensor reacts to magnetic fields disturbing vehicle motion detection. | 217 | |
| 3.41 | Cypher suite and standardized domain parameters | CSM_48, CSM_50 | |
| 4. | Environmental tests | ||
| 4.1 | Temperature | Verify functionality through:
| 213 |
| 4.2 | Humidity | Verify that the vehicle unit can withstand a cyclic damp (heat test) through IEC 60068-2-30, test Db, six 24 hours cycles, each temperature varying from +25 °C to + 55 °C and a relative humidity of 97 % at + 25 °C and equal to 93 % at +55 °C | 214 |
| 4.3 | Mechanical | 1. Sinusoidal vibrations. verify that the vehicle unit can withstand sinusoidal vibrations with the following characteristics:
2. Random vibrations: Test according to ISO 16750-3: Chapter 4.1.2.8: Test VIII: Commercial vehicle, decoupled vehicle cab Random vibration test, 10…2000 Hz, RMS vertical 21,3 m/s 2 , RMS longitudinal 11,8 m/s 2 , RMS lateral 13,1 m/s 2 , 3 axes, 32 h per axis, including temperature cycle – 20…70 °C. This test refers to IEC 60068-2-64: Environmental testing - Part 2-64: Tests - Test Fh: Vibration, broadband random and guidance 3. Shocks: mechanical shock with 3 g half sinus according ISO 16750. The tests described above are performed on different samples of the equipment type being tested. | 219 |
| 4.4 | Protection against water and foreign bodies | Test according to ISO 20653: Road vehicles – Degree of protection (IP code) – Protection of electrical equipment against foreign objects, water and access (No change in parameters); Minimum value IP 40 | 220, 221 |
| 4.5 | Over-voltage protection | Verify that the vehicle unit can withstand a power supply of: 24 V versions : 34V at + 40 °C 1 hour 12V versions : 17V at + 40 °C 1 hour (ISO 16750-2) | 216 |
| 4.6 | Reverse polarity protection | Verify that the vehicle unit can withstand an inversion of its power supply (ISO 16750-2) | 216 |
| 4.7 | Short-circuit protection | Verify that input output signals are protected against short circuits to power supply and ground (ISO 16750-2) | 216 |
| 5. | EMC tests | ||
| 5.1 | Radiated emissions and susceptibility | Compliance with Regulation ECE R10 | 218 |
| 5.2 | Electrostatic discharge | Compliance with ISO 10605:2008 + Technical Corrigendum:2010 + AMD1:2014: +/– 4 kV for contact and +/– 8 kV for air discharge | 218 |
| 5.3 | Conducted transient susceptibility on power supply | For 24V versions: compliance with ISO 7637-2 + ECE Regulation No. 10 Rev. 3:
For 12V versions: compliance with ISO 7637– 1 + ECE Regulation No. 10 Rev. 3:
For load dump proposal, refer to ISO 16750-2, 4th edition, chapter 4.6.4. | 218] |
| No | Test | Description | Related requirements |
|---|---|---|---|
| 1. | Administrative examination | ||
| 1.1 | Documentation | Correctness of documentation | |
| 2. | Visual inspection | ||
| 2.1. | Compliance with documentation | ||
| 2.2. | Identification/markings | 225, 226, | |
| 2.3 | Materials | 219 to 223 | |
| 2.4. | Sealing | 398, 401 to 405 | |
| 3. | Functional tests | ||
| 3.1 | Sensor identification data | 95 to 97* | |
| 3.2 | Motion sensor — vehicle unit pairing | 122*, 204 | |
| 3.3 | Motion detection Motion measurement accuracy | 30 to 35 | |
| 3.4 | Vehicle unit interface | 02 | |
| 3.5 | Check that the motion sensor is immune to constant magnetic field. Alternatively, verify that the motion sensor reacts to constant magnetic fields disturbing vehicle motion detection so that a connected VU can detect, record and store sensor faults | 217 | |
| 4. | Environmental tests | ||
| 4.1 | Operating temperature | Verify functionality (as defined in test No 3.3) in temperature range [– 40°C; + 135°C] through:
| 213 |
| 4.2 | Temperature cycles | Test according to ISO 16750-4: Chapter 5.3.2: Rapid change of temperature with specified transition duration (– 40°C/135 °C, 20 cycles, dwell time 30 min at each temperature) IEC 60068-2-14: Environmental testing; Part 2-14: Tests; Test N: Change of temperature | 213 |
| 4.3 | Humidity cycles | Verify functionality (as defined in test No. 3.3) through IEC 60068-2-30, test Db, six 24 hours cycles, each temperature varying from + 25°C to + 55°C and a relative humidity of 97 % at + 25°C and equal to 93 % at + 55°C | 214 |
| 4.4 | Vibration | ISO 16750-3: Chapter 4.1.2.6: Test VI: Commercial vehicle, engine, gearbox Mixed mode vibration test including a) Sinusoidal vibration test, 20…520 Hz, 11,4 … 120 m/s2, <= 0,5 oct/min b) Random vibration test, 10…2 000 Hz, RMS 177 m/s2 94 h per axis, including temperature cycle – 20…70°C) This test refers to IEC 60068-2-80: Environmental testing — Part 2-80: Tests — Test Fi: Vibration — Mixed mode | 219 |
| 4.5 | Mechanical shock | ISO 16750-3: Chapter 4.2.3: Test VI: Test for devices in or on the gearbox half-sinusoidal shock, acceleration to be agreed in the range 3 000…15 000 m/s2, pulse duration to be agreed, however < 1 ms, number of shocks: to be agreed This test refers to IEC 60068-2-27: Environmental testing. Part 2: Tests. Test Ea and guidance: Shock | 219 |
| 4.6 | Protection against water and foreign bodies | Test according to ISO 20653: Road vehicles — Degree of protection (IP code) — Protection of electrical equipment against foreign objects, water and access (Target value IP 64) | 220, 221 |
| 4.7 | Reverse polarity protection | Verify that the motion sensor can withstand an inversion of its power supply | 216 |
| 4.8 | Short circuit protection | Verify that input output signals are protected against short circuits to power supply and ground | 216 |
| 5. | EMC | ||
| 5.1 | radiated emissions and susceptibility | Verify compliance with Regulation ECE R10 | 218 |
| 5.2 | Electrostatic discharge | Compliance with ISO 10605:2008 + Technical Corrigendum:2010 + AMD1:2014: +/– 4kV for contact and +/– 8kV for air discharge | 218 |
| 5.3 | Conducted transient susceptibility on data lines) | For 24V versions: compliance with ISO 7637-2 + ECE Regulation No. 10 Rev. 3:
For 12V versions: compliance with ISO 7637-1 + ECE Regulation No. 10 Rev. 3:
Pulse 5 shall be tested only for vehicle units designed to be installed in vehicles for which no external common protection against load dump is implemented For load dump proposal, refer to ISO 16750-2, 4th edition, chapter 4.6.4 | 218 |
Tests according to this Section 4,
no. 5 ‘Protocol tests’,
no. 6 ‘Card structure’ and
no. 7 ‘Functional tests’
can be performed by the evaluator or certifier during the Common Criteria (CC) security certification process for the chip module.
Tests number 2.3 and 4.2 are the same. These are the mechanical tests of the combination card body and chip module. If one of these components (card body, chip module) is changed, then these tests are necessary.
| No | Test | Description | Related requirements |
|---|---|---|---|
| 1. | Administrative examination | ||
| 1.1 | Documentation | Correctness of documentation | |
| 2 | Card Body | ||
| 2.1 | Printed Design | Make sure that all features for protection and visible data are correctly printed on the card and compliant. [Designator] Annex 1C, chapter 4.1 ‘Visible data’, 227) The front page shall contain: the words ‘Driver card’ or ‘Control card’ or ‘Workshop card’ or ‘Company card’ printed in capital letters in the official language or languages of the Member State issuing the card, according to the type of the card. [Member State name] Annex 1C, chapter 4.1 ‘Visible data’, 228) The front page shall contain: the name of the Member State issuing the card (optional). [Sign] Annex 1C, chapter 4.1 ‘Visible data’, 229) The front page shall contain: the distinguishing sign of the Member State issuing the card, printed in negative in a blue rectangle and encircled by 12 yellow stars. [Enumeration] Annex 1C, chapter 4.1 ‘Visible data’, 232) The reverse page shall contain: an explanation of the numbered items which appear on the front page of the card. [Colour] Annex 1C, chapter 4.1 ‘Visible data’, 234) Tachograph cards shall be printed with the following background predominant colours:
[Security] Annex 1C, chapter 4.1 ‘Visible data’, 235) Tachograph cards shall bear at least the following features for protection of the card body against counterfeiting and tampering:
[Markings] Annex 1C, chapter 4.1 ‘Visible data’, 236) Member States may add colours or markings, such as national symbols and security features. [Approval mark] Tachograph cards shall contain an approval mark. The approval mark shall be made up of:
| 227 to 229, 232, 234 to 236 |
| 2.2 | Mechanical Tests | [Card size] Tachograph cards must conform to standard ISO/IEC 7810, Identification cards — Physical characteristics, [5] Dimension of card, [5.1] Card size, [5.1.1] Card dimensions and tolererances, card type ID-1 Unused card [Card edges] Tachograph cards must conform to standard ISO/IEC 7810, Identification cards — Physical characteristics, [5] Dimension of card, [5.1] Card size, [5.1.2] Card edges [Card construction] Tachograph cards must conform to standard ISO/IEC 7810, Identification cards — Physical characteristics, [6] Card construction [Card materials] Tachograph cards must conform to standard ISO/IEC 7810, Identification cards — Physical characteristics, [7] Card materials [Bending stiffness] Tachograph cards must conform to standard ISO/IEC 7810, Identification cards — Physical characteristics, [8] Card characteristics, [8.1] Bending stiffness [Toxicity] Tachograph cards must conform to standard ISO/IEC 7810, Identification cards — Physical characteristics, [8] Card characteristics, [8.3] Toxicity [Resistance to chemicals] Tachograph cards must conform to standard ISO/IEC 7810, Identification cards — Physical characteristics, [8] Card characteristics, [8.4] Resistance to chemicals [Card stability] Tachograph cards must conform to standard ISO/IEC 7810, Identification cards — Physical characteristics, [8] Card characteristics, [8.5] Card dimensional stability and warpage with temperature and humidity [Light] Tachograph cards must conform to standard ISO/IEC 7810, Identification cards — Physical characteristics, [8] Card characteristics, [8.6] Light [Durability] Annex 1C, chapter 4.4 ‘Environmental and electrical specifications’, 241) Tachograph cards shall be capable of operating correctly for a five-year period if used within the environmental and electrical specifications. [Peel strength] Tachograph cards must conform to standard ISO/IEC 7810, Identification cards — Physical characteristics, [8] Card characteristics, [8.8] Peel strength [Adhesion or blocking] Tachograph cards must conform to standard ISO/IEC 7810, Identification cards — Physical characteristics, [8] Card characteristics, [8.9] Adhesion or blocking [Warpage] Tachograph cards must conform to standard ISO/IEC 7810, Identification cards — Physical characteristics, [8] Card characteristics, [8.11] Overall card warpage [Resistance to heat] Tachograph cards must conform to standard ISO/IEC 7810, Identification cards — Physical characteristics, [8] Card characteristics, [8.12] Resistance to heat [Surface distortions] Tachograph cards must conform to standard ISO/IEC 7810, Identification cards — Physical characteristics, [8] Card characteristics, [8.13] Surface distortions [Contamination] Tachograph cards must conform to standard ISO/IEC 7810, Identification cards — Physical characteristics, [8] Card characteristics, [8.14] Contamination and interaction of card components | 240, 243 ISO/IEC 7810 |
| 2.3 | Mechanical tests with chip module embedded | [Bending] Tachograph cards must conform to standard ISO/IEC 7810:2003/Amd. 1:2009, Identification cards — Physical characteristics, Amendment 1: Criteria for cards containing integrated circuits [9.2] Dynamic bending stress Total number of bending cycles: 4 000. [Torsion] Tachograph cards must conform to standard ISO/IEC 7810:2003/Amd. 1:2009, Identification cards — Physical characteristics, Amendment 1: Criteria for cards containing integrated circuits [9.3] Dynamic torsional stress Total number of torsion cycles: 4 000. | ISO/IEC 7810 |
| 3 | Module | ||
| 3.1 | Module | Module is the chip encapsulation and the contact plate. [Surface profile] Tachograph cards must conform to standard ISO/IEC 7816-1:2011, Identification cards — Integrated circuit cards — Part 1: Cards with contacts — Physical characteristics [4.2] Surface profile of contacts [Mechanical strength] Tachograph cards must conform to standard ISO/IEC 7816-1:2011, Identification cards — Integrated circuit cards — Part 1: Cards with contacts — Physical characteristics [4.3] Mechanical strength (of a card and contacts) [Electrical resistance] Tachograph cards must conform to standard ISO/IEC 7816-1:2011, Identification cards — Integrated circuit cards — Part 1: Cards with contacts — Physical characteristics [4.4] Electrical resistance (of contacts) [Dimension] Tachograph cards must conform to standard ISO/IEC 7816-2:2007, Identification cards — Integrated circuit cards — Part 2: Cards with contacts — Dimension and location of the contacts [3] Dimension of the contacts [Location] Tachograph cards must conform to standard ISO/IEC 7816-2:2007, Identification cards — Integrated circuit cards — Part 2: Cards with contacts — Dimension and location of the contacts [4] Number and location of the contacts In case of modules with six contacts, contact ‘C4’ and ‘C8’ are not part of this test requirement. | ISO/IEC 7816 |
| 4 | Chip | ||
| 4.1 | Chip | [Operating temperature] The Tachograph card chip shall operate in an ambient temperature range between – 25 °C and + 85 °C. [Temperature and humidity] Annex 1C, chapter 4.4 ‘Environmental and electrical specifications’, 241) Tachograph cards shall be capable of operating correctly in all the climatic conditions normally encountered in Community territory and at least in the temperature range – 25°C to + 70°C with occasional peaks of up to + 85°C, ‘occasional’ meaning not more than 4 hours each time and not over 100 times during the life time of the card. The Tachograph cards are exposed in consecutive steps to the following temperatures and humidities for the given time. After each step the Tachograph cards are tested for electrical functionality. 1. Temperature of – 20 °C for 2 h. 2. Temperature of +/– 0 °C for 2 h. 3. Temperature of + 20 °C, 50 % RH, for 2 h. 4. Temperature of + 50 °C, 50 % RH, for 2 h. 5. Temperature of + 70 °C, 50 % RH, for 2 h. The temperature is increased intermittently to + 85 °C, 50 % RH, for 60 min. 6. Temperature of + 70 °C, 85 % RH, for 2 h. The temperature is increased intermittently to + 85 °C, 85 % RH, for 30 min. [Humidity] Annex 1C, chapter 4.4 ‘Environmental and electrical specifications’, 242) Tachograph cards shall be capable of operating correctly in the humidity range 10 % to 90 %. [Electromagnetic compatibility — EMC] Annex 1C, chapter 4.4 ‘Environmental and electrical specifications’ 244) During operation, Tachograph cards shall conform to ECE R10 related to electromagnetic compatibility. [Static electricity] Annex 1C, chapter 4.4 ‘Environmental and electrical specifications’, 244) During operation, Tachograph cards shall be protected against electrostatic discharges. Tachograph cards must conform to standard ISO/IEC 7810:2003/Amd. 1:2009, Identification cards — Physical characteristics, Amendment 1: Criteria for cards containing integrated circuits [9.4] Static electricity [9.4.1] Contact IC cards Test voltage: 4 000 V. [X-rays] Tachograph cards must conform to standard ISO/IEC 7810:2003/Amd. 1:2009, Identification cards — Physical characteristics, Amendment 1: Criteria for cards containing integrated circuits [9.1] X-rays [Ultraviolet light] ISO/IEC 10373-1:2006, Identification cards — Test methods — Part 1: General characteristics [5.11] Ultraviolet light [3-wheel] Tachograph cards must conform to standard ISO/IEC 10373-1:2006/Amd. 1:2012, Identification cards — Test methods — Part 1: General characteristics, Amendment 1 [5.22] ICC — Mechanical strength: 3 wheel test for ICCs with contacts [Wrapping] Tachograph cards must conform to standard MasterCard CQM V2.03:2013 [11.1.3] R-L3-14-8: Wrapping Test Robustness [13.2.1.32] TM-422: Mechanical Reliability: Wrapping Test | 241 to 244 ECE R10 ISO/IEC 7810 ISO/IEC 10373 |
| 4.2 | Mechanical tests chip module embedded in the card body-> same as 2.3 | [Bending] Tachograph cards must conform to standard ISO/IEC 7810:2003/Amd. 1:2009, Identification cards — Physical characteristics, Amendment 1: Criteria for cards containing integrated circuits [9.2] Dynamic bending stress Total number of bending cycles: 4 000. [Torsion] Tachograph cards must conform to standard ISO/IEC 7810:2003/Amd. 1:2009, Identification cards — Physical characteristics, Amendment 1: Criteria for cards containing integrated circuits [9.3] Dynamic torsional stress Total number of torsion cycles: 4 000. | ISO/IEC 7810 |
| 5 | Protocol tests | ||
| 5.1 | ATR | Check that the ATR is compliant | ISO/IEC 7816-3 TCS_14, TCS_17, TCS_18 |
| 5.2 | T=0 | Check that T=0 protocol is compliant | ISO/IEC 7816-3 TCS_11, TCS_12, TCS_13, TCS_15 |
| 5.3 | PTS | Check that the PTS command is compliant by setting T=1 from T=0. | ISO/IEC 7816-3 TCS_12, TCS_19, TCS_20, TCS_21 |
| 5.4 | T=1 | Check that T=1 protocol is compliant | ISO/IEC 7816-3 TCS_11, TCS_13, TCS_16 |
| 6 | Card structure | ||
| 6.1 | Test that the file structure of the card is compliant by checking the presence of the mandatory files in the card and their access conditions | TCS_22 to TCS_28 TCS_140 to TCS_179 | |
| 7 | Functional tests | ||
| 7.1 | Normal processing | Test at least once each allowed usage of each command (ex: test the UPDATE BINARY command with CLA = ‘00’, CLA = ‘0C’ and with different P1,P2 and Lc parameters) Check that the operations have actually been performed in the card (ex: by reading the file the command has been performed on) | TCS_29 to TCS_139 |
| 7.2 | Error messages | Test at least once each error message (as specified in Appendix 2) for each command Test at least once every generic error (except ‘6400’ integrity errors checked during security certification) | |
| 7.3 | Cypher suite and standardized domain parameters | CSM_48, CSM_50 | |
| 8 | Personalisation | ||
| 8.1 | Optical personalisation | Annex 1C, chapter 4.1 ‘Visible data’, 230) The front page shall contain: information specific to the card issued. Annex 1C, chapter 4.1 ‘Visible data’, 231) The front page shall contain: dates using a ‘dd/mm/yyyy’ or ‘dd.mm.yyyy’ format (day, month, year). Annex 1C, chapter 4.1 ‘Visible data’, 235) Tachograph cards shall bear at least the following features for protection of the card body against counterfeiting and tampering:
| 230, 231, 235 |
| No | Test | Description | Related requirements | |
|---|---|---|---|---|
| 1. | Administrative examination | |||
| 1.1 | Documentation | Correctness of documentation | ||
| 2. | Visual inspection for external GNSS facility | |||
| 2.1. | Compliance with documentation | |||
| 2.2. | Identification/markings | 224 to 226 | ||
| 2.3 | Materials | 219 to 223 | ||
| 3. | Functional tests | |||
| 3.1 | Sensor identification data | 98,99 | ||
| 3.2 | External GNSS module — vehicle unit coupling | 123, 205 | ||
| 3.3 | GNSS position | 36, 37 | ||
| 3.4 | Vehicle unit interface when the GNSS receiver is external to the Vehicle Unit | 03 | ||
| 3.5 | Cypher suite and standardized domain parameters | CSM_48, CSM_50 | ||
| 4. | Environmental tests | |||
| 4.1 | Temperature | Verify functionality through:
| 213 | |
| 4.2 | Humidity | Verify that the vehicle unit can withstand a cyclic damp (heat test) through IEC 60068-2-30, test Db, six 24 hours cycles, each temperature varying from + 25 °C to + 55 °C and a relative humidity of 97 % at + 25 °C and equal to 93 % at + 55 °C | 214 | |
| 4.3 | Mechanical | 1. Sinusoidal vibrations. verify that the vehicle unit can withstand sinusoidal vibrations with the following characteristics:
This requirement is verified through IEC 60068-2-6, test Fc, with a minimum test duration of 3 × 12 hours (12 hours per axis) ISO 16750-3 does not require a sinusoidal vibration test for devices located in the decoupled vehicle cab. 2. Random vibrations: Test according to ISO 16750-3: Chapter 4.1.2.8: Test VIII: Commercial vehicle, decoupled vehicle cab Random vibration test, 10…2 000 Hz, RMS vertical 21,3 m/s2, RMS longitudinal 11,8 m/s2, RMS lateral 13,1 m/s2, 3 axes, 32 h per axis, including temperature cycle – 20…70°C. This test refers to IEC 60068-2-64: Environmental testing — Part 2-64: Tests — Test Fh: Vibration, broadband random and guidance 3. Shocks: mechanical shock with 3g half sinus according ISO 16750. The tests described above are performed on different samples of the equipment type being tested. | 219 | |
| 4.4 | Protection against water and foreign bodies | Test according to ISO 20653: Road vehicles — Degree of protection (IP code) — Protection of electrical equipment against foreign objects, water and access (No change in parameters) | 220, 221 | |
| 4.5 | Over-voltage protection | Verify that the vehicle unit can withstand a power supply of: | 216 | |
| 24 V versions: | 34 V at + 40 °C 1 hour | |||
| 12V versions: | 17 V at + 40 °C 1 hour | |||
| ( ISO 16750-2, chapter 4.3) | ||||
| 4.6 | Reverse polarity protection | Verify that the vehicle unit can withstand an inversion of its power supply (ISO 16750-2, chapter 4.7) | 216 | |
| 4.7 | Short-circuit protection | Verify that input output signals are protected against short circuits to power supply and ground (ISO 16750-2, chapter 4.10]) | 216 | |
| 5 | EMC tests | |||
| 5.1 | Radiated emissions and susceptibility | Compliance with Regulation ECE R10 | 218 | |
| 5.2 | Electrostatic discharge | Compliance with ISO 10605:2008 + Technical Corrigendum: 2010 + AMD1:2014: +/– 4kV for contact and +/– 8kV for air discharge | 218 | |
| 5.3 | Conducted transient susceptibility on power supply | For 24V versions: compliance with ISO 7637-2 + ECE Regulation No. 10 Rev. 3:
For 12V versions: compliance with ISO 7637-1 + ECE Regulation No. 10 Rev. 3:
Pulse 5 shall be tested only for vehicle units designed to be installed in vehicles for which no external common protection against load dump is implemented For load dump proposal, refer to ISO 16750-2, 4th edition, chapter 4.6.4. | 218 | |
| No | Test | Description | Related requirements | |
|---|---|---|---|---|
| 1. | Administrative examination | |||
| 1.1 | Documentation | Correctness of documentation | ||
| 2. | Visual inspection | |||
| 2.1. | Compliance with documentation | |||
| 2.2. | Identification / markings | 225, 226 | ||
| 2.3 | Materials | 219 to 223 | ||
| 3. | Functional tests | |||
| 3.1 | Remote communication for targeted roadside checks | 4, 197 to 199 | ||
| 3.2 | Recording and storing in data memory | 91 | ||
| 3.3 | Communication with Vehicle Unit | Appendix 14 DSC_66 to DSC_70, DSC_71 to DSC_76 | ||
| 4. | Environmental tests | |||
| 4.1 | Temperature | Verify functionality through:
| 213 | |
| 4.2 | Protection against water and foreign bodies | Test according to ISO 20653: Road vehicles – Degree of protection (IP code) – Protection of electrical equipment against foreign objects, water and access (targeted value IP40) | 220, 221 | |
| 5 | EMC tests | |||
| 5.1 | Radiated emissions and susceptibility | Compliance with Regulation ECE R10 | 218 | |
| 5.2 | Electrostatic discharge | Compliance with ISO 10605:2008 + Technical Corrigendum:2010 + AMD1:2014: +/– 4 kV for contact and +/– 8 kV for air discharge | 218 | |
| 5.3 | Conducted transient susceptibility on power supply | For 24V versions: compliance with ISO 7637-2 + ECE Regulation No. 10 Rev. 3:
For 12V versions: compliance with ISO 7637-1 + ECE Regulation No. 10 Rev. 3:
For load dump proposal, refer to ISO 16750-2, 4th edition, chapter 4.6.4. | 218] | |
| No | Test | Description | Related requirements |
|---|---|---|---|
| 1. | Administrative examination | ||
| 1.1 | Documentation | Correctness of documentation | |
| 2 | General Tests | ||
| 2.1 | Number of characters per line | Visual inspection of printouts. | 172 |
| 2.2 | Minimum character size | Visual inspection of printout and character inspection. | 173 |
| 2.3 | Supported character sets | The printer shall support characters specified in Appendix 1 Chapter 4 ‘Character sets’. | 174 |
| 2.4 | Printouts definition | Check of tachograph type approval and visual inspection of printouts | 174 |
| 2.5 | Legibility and identification of printouts | Inspection of printouts Demonstrated by test reports and test protocols by manufacturer. All homologation number(s) of tachographs with which the printer paper may be used are imprinted on the paper. | 175, 177, 178 |
| 2.6 | Addition of handwritten notes | Visual inspection: Field for signature of the driver is available. Fields for additional other handwritten entries are available. | 180 |
| 2.7 | Additional details on paper faces. | Paper's face and reverse side may feature additional details and information. These additional details and information may not interfere with the legibility of the printouts. Visual inspection. | 177, 178 |
| 3 | Storage Tests | ||
| 3.1 | Dry Heat | Preconditioning: 16 hours at + 23 °C ± 2 °C/55 % ± 3 % relative humidity Test environment: 72 hours at + 70 °C ± 2 °C Recovery: 16 hours at + 23 °C ± 2 °C/55 % ± 3 % relative humidity | 176, 178 IEC 60068-2-2-Bb |
| 2.2 | Damp Heat | Preconditioning: 16 hours at + 23 °C ± 2 °C/55 % ±3 % relative humidity Test environment: 144 hours at + 55 °C ± 2 °C and 93 % ± 3 % r.h. Recovery: 16 hours at + 23 °C ± 2 °C/55 % ± 3 % relative humidity | 176, 178 IEC 60068-2-78-Cab |
| 4 | Paper In-Service Tests | ||
| 4.1 | Humidity resistance background (unprinted paper) | Preconditioning: 16 hours at + 23 °C ± 2 °C/55 % ±3 % relative humidity Test environment: 144 hours at + 55 °C ± 2 °C and 93 % ± 3 % r.h. Recovery: 16 hours at + 23 °C ± 2 °C/55 % ± 3 % relative humidity | 176, 178 IEC 60068-2-78-Cab |
| 4.2 | Printability | Preconditioning: 24 hours at + 40 °C ± 2 °C/93 % ± 3 % relative humidity Test environment: printout produced at + 23 °C ± 2 °C Recovery: 16 hours at + 23 °C ± 2 °C/55 % ± 3 % relative humidity | 176, 178 |
| 4.3 | Heat resistance | Preconditioning: 16 hours at + 23 °C ± 2 °C/55 % ± 3 % relative humidity Test environment: 2 hours at + 70 °C ± 2 °C, dry heat Recovery: 16 hours at + 23 °C ± 2 °C/55 % ± 3 % relative humidity | 176, 178 IEC 60068-2-2-Bb |
| 4.4 | Low temperature resistance | Preconditioning: 16 hours at + 23 °C ± 2 °C/55 % ± 3 % relative humidity Test environment: 24 hours – 20 °C ± 3 °C, dry cold Recovery: 16 hours at + 23 °C ± 2 °C/55 % ± 3 % relative humidity | 176, 178 ISO 60068-2-1-Ab |
| 4.5 | Light resistance | Preconditioning: 16 hours at + 23 °C ± 2 °C/55 % ± 3 % relative humidity Test environment: 100 hours under 5 000 Lux illumination at + 23 °C ± 2 °C/55 % ± 3 % relative humidity Recovery: 16 hours at + 23 °C ± 2 °C/55 % ± 3 % relative humidity | 176, 178 |
Legibility criteria for tests 3.x and 4.x:
Printout legibility is assured if optical densities comply with the following limits:
Printed characters: min. 1,0
Background (unprinted paper): max. 0,2
Optical densities of the resulting printouts shall be measured according to DIN EN ISO 534.
Printouts shall show no dimensional changes and remain clearly legible.
| [F2No | Test | Description |
|---|---|---|
| 8.1 Interoperability tests between vehicle units and tachograph cards | ||
| 1 | Mutual authentication | Check that the mutual authentication between the vehicle unit and the tachograph card runs normally |
| 2 | Write/read tests | Execute a typical activity scenario on the vehicle unit. The scenario shall be adapted to the type of card being tested and involve writings in as many EFs as possible in the card Verify through a vehicle unit downloading that all corresponding recordings have been properly made Verify through a card downloading that all corresponding recordings have been properly made Verify through daily printouts that all corresponding recordings can be properly read |
| 8.2 Interoperability tests between vehicle units and motion sensors | ||
| 1 | Pairing | Check that the pairing between the vehicle units and the motion sensors runs normally |
| 2 | Activity tests | Execute a typical activity scenario on the motion sensor. The scenario shall involve a normal activity and creating as many events or faults as possible. Verify through a vehicle unit downloading that all corresponding recordings have been properly made Verify through a card downloading that all corresponding recordings have been properly made Verify through a daily printout that all corresponding recordings can be properly read |
| 8.3 Interoperability tests between vehicle units and external GNSS facilities (when applicable) | ||
| 1 | Mutual authentication | Check that the mutual authentication (coupling) between the vehicle unit and the external GNSS module runs normally. |
| 2 | Activity tests | Execute a typical activity scenario on the external GNSS facility. The scenario shall involve a normal activity and creating as many events or faults as possible. Verify through a vehicle unit downloading that all corresponding recordings have been properly made Verify through a card downloading that all corresponding recordings have been properly made Verify through a daily printout that all corresponding recordings can be properly read] |
This appendix specifies the IT security requirements for the smart tachograph system components (second-generation tachograph).
vehicle unit
tachograph card,
motion sensor,
external GNSS facility.
Protection Profile for vehicle unit,
Protection Profile for tachograph card,
Protection Profile for motion sensor,
Protection Profile for external GNSS facility.
The Protection Profile for vehicle unit shall address the cases when the VU is designed to be used or not with an external GNSS facility. In the former case, the security requirements of the external GNSS facility are provided in the dedicated Protection Profile.
This Appendix specifies the security mechanisms ensuring
mutual authentication between different components of the tachograph system.
confidentiality, integrity, authenticity and/or non-repudiation of data transferred between different components of the tachograph system or downloaded to external storage media.
This Appendix consists of two parts. Part A defines the security mechanisms for the first-generation tachograph system (digital tachograph). Part B defines the security mechanisms for the second-generation tachograph system (smart tachograph).
The mechanisms specified in Part A of this Appendix shall apply if at least one of the components of the tachograph system involved in a mutual authentication and/or data transfer process is of the first generation.
The mechanisms specified in Part B of this Appendix shall apply if both components of the tachograph system involved in the mutual authentication and/or data transfer process are of the second generation.
Appendix 15 provides more information regarding the use of first generation components in combination with second-generation components.
The following references are used in this Appendix:
National Institute of Standards and Technology (NIST). FIPS Publication 180-1: Secure Hash Standard. April 1995.
RSA Laboratories. PKCS # 1: RSA Encryption Standard. Version 2.0. October 1998.
National Institute of Standards and Technology (NIST). FIPS Publication 46-3: Data Encryption Standard. Draft 1999.
ANSI X9.52, Triple Data Encryption Algorithm Modes of Operation. 1998.
Information Technology — Identification cards — Integrated circuit(s) cards with contacts — Part 4: Interindustry commands for interexchange. First edition: 1995 + Amendment 1: 1997.
Information Technology — Identification cards — Integrated circuit(s) cards with contacts — Part 6: Interindustry data elements. First edition: 1996 + Cor 1: 1998.
Information Technology — Identification cards — Integrated circuit(s) cards with contacts — Part 8: Security related interindustry commands. First edition 1999.
Information Technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Mechanisms using a hash function. First edition: 1997.
Information Technology — Security techniques — Entity authentication mechanisms — Part 3: Entity authentication using a public key algorithm. Second edition 1998.
Road vehicles — Tachograph systems — Part 3: Motion sensor interface.
The following notations and abbreviated terms are used in this Appendix:
a key bundle for use by the Triple Data Encryption Algorithm,
Certification Authority,
Certification Authority Reference,
Cryptographic Checksum,
Cryptogram,
Command Header,
Certificate Holder Authorisation,
Certificate Holder Reference,
Decryption with DES,
Data Element,
Data Object,
RSA private key, private exponent,
RSA public key, public exponent,
Encryption with DES,
Equipment,
hash value, an output of Hash,
hash function,
Key Identifier,
TDES key. Master Key defined in ISO 16844-3.
TDES key inserted in vehicle units.
TDES key inserted in workshop cards.
message representative, an integer between 0 and n-1,
RSA keys, modulus,
Padding Bytes,
Padding Indicator byte (for use in Cryptogram for confidentiality DO),
Plain Value,
signature representative, an integer between 0 and n-1,
Send Sequence Counter,
Secure Messaging,
TDEA Cipher Block Chaining Mode of Operation
Triple Data Encryption Algorithm,
Tag Length Value,
Vehicle Unit,
the certificate of user X issued by a certification authority,
a certification authority of user X,
the operation of unwrapping a certificate to extract a public key. It is an infix operator, whose left operand is the public key of a certification authority, and whose right operand is the certificate issued by that certification authority. The outcome is the public key of the user X whose certificate is the right operand,
RSA public key of a user X,
RSA encipherment of some information I, using the public key of user X,
RSA private key of a user X,
RSA encipherment of some information I, using the private key of user X,
an Hexadecimal value,
concatenation operator.
authentication between vehicle units and cards,
transport of Triple-DES session keys between vehicle units and tachograph cards,
digital signature of data downloaded from vehicle units or tachograph cards to external media.
X.SK[m] = s = md mod nU.K.
X.PK[s] = m = se mod n
A more comprehensive description of the RSA function can be found in reference [PKCS1]. Public exponent, e, for RSA calculations is an integer between 3 and n-1 satisfying gcd(e, lcm(p-1, q-1))=1.
European level,
Member State level,
Equipment level.
The following picture summarises the data flow of this process:
The confidentiality of the three Triple DES keys described below shall be appropriately maintained during generation, transport (if any) and storage.
In order to support tachograph components compliant with ISO 16844, the European Certification Authority and the Member State Certification Authorities shall, in addition, ensure the following:
use Km to encrypt motion sensor data requested by motion sensor manufacturers (data to be encrypted with Km is defined in ISO 16844-3),
forward KmVU to vehicle unit manufacturers, under appropriately secured procedures, for insertion in vehicle units,
ensure that KmWC will be inserted in all workshop cards ( in
elementary file) during card personalisation.
| Data | Format | Bytes | Obs |
|---|---|---|---|
| CPI | INTEGER | 1 | Certificate Profile Identifier (‘01’ for this version) |
| CAR | OCTET STRING | 8 | Certification Authority Reference |
| CHA | OCTET STRING | 7 | Certificate Holder Authorisation |
| EOV | TimeReal | 4 | Certificate end of validity. Optional, ‘FF’ padded if not used. |
| CHR | OCTET STRING | 8 | Certificate Holder Reference |
| n | OCTET STRING | 128 | Public key (modulus) |
| e | OCTET STRING | 8 | Public Key (public exponent) |
| 164 | |||
The headerlist associated with this certificate content is as follows:
| ‘4D’ | ‘16’ | ‘5F 29’ | ‘01’ | ‘42’ | ‘08’ | ‘5F 4B’ | ‘07’ | ‘5F 24’ | ‘04’ | ‘5F 20’ | ‘08’ | ‘7F 49’ | ‘05’ | ‘81’ | ‘81 80’ | ‘82’ | ‘08’ |
| Extended Headerlist Tag | Length of header list | CPI Tag | CPI Length | CAR Tag | CAR Length | CHA Tag | CHA Length | EOV Tag | EOV Length | CHR Tag | CHR Length | Public Key Tag (Constructed) | Length of subsequent DOs | modulus Tag | modulus length | public exponent Tag | public exponent length |
Equipment (VU or Card):
| Data | Equipment serial number | Date | Type | Manufacturer |
|---|---|---|---|---|
| Length | 4 Bytes | 2 Bytes | 1 Byte | 1 Byte |
| Value | Integer | mm yy BCD coding | Manufacturer specific | Manufacturer code |
In the case of a VU, the manufacturer, when requesting certificates, may or may not know the identification of the equipment in which the keys will be inserted.
In the first case, the manufacturer will send the equipment identification with the public key to its Member State authority for certification. The certificate will then contain the equipment identification, and the manufacturer must ensure that keys and certificate are inserted in the intended equipment. The Key identifier has the form shown above.
In the later case, the manufacturer must uniquely identify each certificate request and send this identification with the public key to its Member State authority for certification. The certificate will contain the request identification. The manufacturer must feed back its Member State authority with the assignment of key to equipment (i.e. certificate request identification, equipment identification) after key installation in the equipment. The key identifier has the following form:
| Data | Certificate request serial number | Date | Type | Manufacturer |
|---|---|---|---|---|
| Length | 4 Bytes | 2 Bytes | 1 Byte | 1 Byte |
| Value | Integer | mm yy BCD coding | ‘FF’ | Manufacturer code |
Certification Authority:
| Data | Authority Identification | Key serial number | Additional info | Identifier |
|---|---|---|---|---|
| Length | 4 Bytes | 1 Byte | 2 Bytes | 1 Byte |
| Value | 1 Byte nation numerical code 3 Bytes nation alphanumerical code | Integer | additional coding (CA specific) ‘FF FF’ if not used | ‘01’ |
The key serial number is used to distinguish the different keys of a Member State, in the case the key is changed.
X.C = X.CA.SK[‘6A’ || Cr || Hash(Cc) || ‘BC’] || Cn || X.CAR
| With certificate content = Cc = | Cr | || | Cn |
| 106 bytes | 58 bytes |
| ‘7F 21’ | ‘09’ | ‘5F 37’ | ‘81 80’ | ‘5F 38’ | ‘3A’ | ‘42’ | ‘08’ |
| CV Certificate Tag (Constructed) | Length of subsequent DOs | Signature Tag | Signature Length | Remainder Tag | Remainder Length | CAR Tag | CAR Length |
Certificate verification and unwrapping consists in verifying the signature in accordance with ISO/IEC 9796-2, retrieving the certificate content and the public key contained: X.PK = X.CA.PK o X.C, and verifying the validity of the certificate.
Verify signature and retrieve content:
from CAR' select appropriate Certification Authority Public Key (if not done before through other means)
open Sign with CA Public Key: Sr'= X.CA.PK [Sign],
check Sr' starts with ‘6A’ and ends with ‘BC’
Recover certificate content C' = Cr' || Cn',
check Hash(C') = H'
If the checks are OK the certificate is a genuine one, its content is C'.
Verify validity. From C':
if applicable, check End of validity date,
Retrieve and store public key, Key Identifier, Certificate Holder Authorisation and Certificate End of Validity from C':
X.PK = n || e
X.KID = CHR
X.CHA = CHA
X.EOV = EOV
Mutual authentication between cards and VUs is based on the following principle:
Each party shall demonstrate to the other that it owns a valid key pair, the public key of which has been certified by a Member State certification authority, itself being certified by the European certification authority.
Demonstration is made by signing with the private key a random number sent by the other party, who must recover the random number sent when verifying this signature.
The mechanism is triggered at card insertion by the VU. It starts with the exchange of certificates and unwrapping of public keys, and ends with the setting of a session key.
The structure of commands and responses when using secure messaging is therefore the following:
The DOs used are a partial set of the Secure Messaging DOs described in ISO/IEC 7816-4:
| Tag | Mnemonic | Meaning |
|---|---|---|
| ‘81’ | TPV | Plain Value not BER-TLV coded data (to be protected by CC) |
| ‘97’ | TLE | Value of Le in the unsecured command (to be protected by CC) |
| ‘99’ | TSW | Status-Info (to be protected by CC) |
| ‘8E’ | TCC | Cryptographic Checksum |
| ‘87’ | TPI CG | Padding Indicator Byte || Cryptogram (Plain Value not coded in BER-TLV) |
Given an unsecured command response pair:
| Command header | Command body | |||||
|---|---|---|---|---|---|---|
| CLA | INS | P1 | P2 | [Lc field] | [Data field] | [Le field] |
| four bytes | L bytes, denoted as B1 to BL | |||||
| Response body | Response trailer | |
|---|---|---|
| [Data field] | SW1 | SW2 |
| Lr data bytes | two bytes | |
The corresponding secured command response pair is:
Secured command:
| Command header (CH) | Command body | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| CLA | INS | P1 | P2 | [New Lc field] | [New Data field] | [New Le field] | ||||||||
| ‘OC’ | Length of New Data field | TPV | LPV | PV | TLE | LLE | Le | TCC | LCC | CC | ‘00’ | |||
| ‘81’ | Lc | Data field | ‘97’ | ‘01’ | Le | ‘8E’ | ‘04’ | CC | ||||||
Data to be integrated in checksum = CH || PB || TPV || LPV || PV || TLE || LLE || Le || PB
PB = Padding Bytes (80 .. 00) in accordance with ISO-IEC 7816-4 and ISO 9797 method 2.
DOs PV and LE are present only when there is some corresponding data in the unsecured command.
Secured response:
Case where response data field is not empty and needs not to be protected for confidentiality:
| Response body | Response trailer | |||||
|---|---|---|---|---|---|---|
| [New Data field] | new SW1 SW2 | |||||
| TPV | LPV | PV | TCC | LCC | CC | |
| ‘81’ | Lr | Data field | ‘8E’ | ‘04’ | CC | |
Data to be integrated in checksum = TPV || LPV || PV || PB
Case where response data field is not empty and needs to be protected for confidentiality:
| Response body | Response trailer | |||||
|---|---|---|---|---|---|---|
| [New Data field] | new SW1 SW2 | |||||
| TPI CG | LPI CG | PI CG | TCC | LCC | CC | |
| ‘87’ | PI || CG | ‘8E’ | ‘04’ | CC | ||
Data to be carried by CG: non BER-TLV coded data and padding bytes.
Data to be integrated in checksum = TPI CG || LPI CG || PI CG || PB
Case where response data field is empty:
| Response body | Response trailer | |||||
|---|---|---|---|---|---|---|
| [New Data field] | new SW1 SW2 | |||||
| TSW | LSW | SW | TCC | LCC | CC | |
| ‘99’ | ‘02’ | New SW1 SW2 | ‘8E’ | ‘04’ | CC | |
Data to be integrated in checksum = TSW || LSW || SW || PB
:
Verification of Cryptographic Checksum failed,
:
Expected SM Data Objects missing,
:
SM Data Objects incorrect.
Initial stage: The initial check block y0 is E(Ka, SSC).
Sequential stage: The check blocks y1, .., yn are calculated using Ka.
Final stage: The cryptographic checksum is calculated from the last check block yn as follows: E(Ka, D(Kb, yn)).
where E() means encryption with DES, and D() means decryption with DES.
The four most significant bytes of the cryptographic checksum are transferred
Initial SSC: Rnd3 (4 least significant bytes) || Rnd1 (4 least significant bytes).
The following figure shows the calculation of the retail MAC:
The following figure shows the application of keys in TDES:
Signature = EQT.SK[‘00’ || ‘01’ || PS || ‘00’ || DER(SHA-1(Data))]
PS = Padding string of octets with value ‘FF’ such that length is 128.
DER(SHA-1(M)) is the encoding of the algorithm ID for the hash function and the hash value into an ASN.1 value of type DigestInfo (distinguished encoding rules):
‘30’||‘21’||‘30’||‘09’||‘06’||‘05’||‘2B’||‘0E’||‘03’||‘02’||‘1A’||‘05’||‘00’||‘04’||‘14’||Hash Value.
The European public key EUR.PK needs to be known independently (and trusted) by the verifier.
The following table illustrates the protocol an IDE carrying a Control card can follow to verify the integrity of data downloaded and stored on the ESM (External Storage media). The control card is used to perform the decipherement of digital signatures. This function may in this case not be implemented in the IDE.
The equipment that has downloaded and signed the data to be analysed is denoted EQT.
The following references are used in this part of this Appendix.
National Institute of Standards and Technology (NIST), FIPS PUB 197: Advanced Encryption Standard (AES), November 26, 2001
National Institute of Standards and Technology (NIST), FIPS PUB 186-4: Digital Signature Standard (DSS), July 2013
ISO/IEC 7816-4, Identification cards — Integrated circuit cards — Part 4: Organization, security and commands for interchange. Third edition 2013-04-15
ISO/IEC 7816-8, Identification cards — Integrated circuit cards — Part 8: Commands for security operations. Second edition 2004-06-01
ISO/IEC 8825-1, Information technology — ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER). Fourth edition, 2008-12-15
ISO/IEC 9797-1, Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher. Second edition, 2011-03-01
ISO/IEC 10116, Information technology — Security techniques — Modes of operation of an n-bit block cipher. Third edition, 2006-02-01
ISO/IEC 16844-3, Road vehicles — Tachograph systems — Part 3: Motion sensor interface. First edition 2004, including Technical Corrigendum 1 2006
Elliptic Curve Cryptography Subject Public Key Information, March 2009
Elliptic Curve Cryptography (ECC) — Brainpool Standard Curves and Curve Generation, 2010
HMAC-based Extract-and-Expand Key Derivation Function (HKDF), May 2010
National Institute of Standards and Technology (NIST), FIPS PUB 180-4: Secure Hash Standard, March 2012
National Institute of Standards and Technology (NIST), Special Publication 800-38B: Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication, 2005
BSI Technical Guideline TR-03111, Elliptic Curve Cryptography, version 2.00, 2012-06-28
The following notations and abbreviated terms are used in this Appendix:
Advanced Encryption Standard
Certificate Authority
Certificate Authority Reference
Cipher Block Chaining (mode of operation)
Command Header
Certificate Holder Authorisation
Certificate Holder Reference
Constant Vector
Distinguished Encoding Rules
Data Object
Dedicated Short Range Communication
Elliptic Curve Cryptography
Elliptic Curve Digital Signature Algorithm
Elliptic Curve Diffie-Hellman (key agreement algorithm)
External GNSS Facility
Equipment
Intelligent Dedicated Equipment
Motion Sensor Master Key, allowing the pairing of a Vehicle Unit to a Motion Sensor
Key inserted in vehicle units, allowing a VU to derive the Motion Sensor Master Key if a workshop card is inserted into the VU
Key inserted in workshop cards, allowing a VU to derive the Motion Sensor Master Key if a workshop card is inserted into the VU
Message Authentication Code
Motion Sensor
Most Significant Bit
Public Key Infrastructure
Remote Communication Facility
Send Sequence Counter
Secure Messaging
Triple Data Encryption Standard
Tag Length Value
Vehicle Unit
the public key certificate of user X
the certificate authority that issued the certificate of user X
the certificate authority reference mentioned in the certificate of user X
the certificate holder reference mentioned in the certificate of user X
public key of user X
private key of user X
ephemeral public key of user X
ephemeral private key of user X
a hexadecimal value
concatenation operator
The definitions of terms used in this Appendix are included in section I of Annex 1C.
mutual authentication between a vehicle unit and a card,
agreement of AES session keys between a vehicle unit and a card,
ensuring the authenticity, integrity and non-repudiation of data downloaded from vehicle units or tachograph cards to external media.
coupling of a vehicle unit and an external GNSS facility,
mutual authentication between a vehicle unit and an external GNSS facility,
agreement of an AES session key between a vehicle unit and an external GNSS facility.
ensuring authenticity and integrity of data exchanged between a vehicle unit and a tachograph card,
where applicable, ensuring confidentiality of data exchanged between a vehicle unit and a tachograph card.
ensuring authenticity and integrity of data exchanged between a vehicle unit and an external GNSS facility.
pairing of a vehicle unit and a motion sensor,
mutual authentication between a vehicle unit and a motion sensor,
ensuring confidentiality of data exchanged between a vehicle unit and a motion sensor.
ensuring confidentiality, authenticity and integrity of data transmitted from a vehicle unit to a control card.
Note: the object identifiers mentioned in the last column of Table 1 are specified in [RFC 5639] for the Brainpool curves and in [RFC 5480] for the NIST curves.U.K.
| Table 2 | ||||
| Allowed cipher suites | ||||
| Cipher suite Id | ECC key size (bits) | AES key length (bits) | Hashing algorithm | MAC length (bytes) |
|---|---|---|---|---|
| CS#1 | 256 | 128 | SHA-256 | 8 |
| CS#2 | 384 | 192 | SHA-384 | 12 |
| CS#3 | 512/521 | 256 | SHA-512 | 16 |
Note: ECC keys sizes of 512 bits and 521 bits are considered to be equal in strength for all purposes within this Appendix.U.K.
Note: the keys described in this section are used for mutual authentication and secure messaging between vehicle units and tachograph cards and between vehicle units and external GNSS facilities. These processes are described in detail in chapters 10 and 11 of this Appendix.U.K.
European level,
Member State level,
Equipment level.
Note: The introduction of a new root key pair also implies that ERCA will generate a new motion sensor master key and a new DSRC master key, see sections 9.2.1.2 and 9.2.2.2.U.K.
Note: Since a link certificate contains the ERCA generation X public key and is signed with the ERCA generation X-1 private key, a link certificate offers equipment issued under generation X-1 a method to trust equipment issued under generation X.U.K.
The current EUR key pair and corresponding certificate
All previous EUR certificates to be used for the verification of MSCA certificates that are still valid
Link certificates for all generations of EUR certificates except the first one
The current MSCA_Card key pair and corresponding certificate
All previous MSCA_Card certificates to be used for the verification of the certificates of tachograph cards that are still valid
The current EUR certificate necessary for the verification of the current MSCA certificate
All previous EUR certificates necessary for the verification of all MSCA certificates that are still valid
The current MSCA_VU-EGF key pair and corresponding certificate
All previous MSCA_VU-EGF public keys to be used for the verification of the certificates of VUs or external GNSS facilities that are still valid
The VU_MA private key and corresponding certificate
The VU_Sign private key and corresponding certificate
The MSCA_VU-EGF certificate containing the MSCA_VU-EGF.PK public key to be used for verification of the VU_MA certificate and VU_Sign certificate
The EUR certificate containing the EUR.PK public key to be used for verification of the MSCA_VU-EGF certificate
The EUR certificate whose validity period directly precedes the validity period of the EUR certificate to be used to verify the MSCA_VU-EGF certificate, if existing
The link certificate linking these two EUR certificates, if existing
For driver cards: 5 years
For company cards: 5 years
For control cards: 2 years
For workshop cards: 1 year]
Note: the extended validity period of a Card_Sign certificate allows a driver card to create valid signatures over downloaded data during the first month after it has expired. This is necessary in view of Regulation (EU) No 581/2010, which requires that a data download from a driver card must be possible up to 28 days after the last data has been recorded.U.K.
The Card_MA private key and corresponding certificate
For driver cards and workshop cards additionally: the Card_Sign private key and corresponding certificate
The MSCA_Card certificate containing the MSCA_Card.PK public key to be used for verification of the Card_MA certificate and Card_Sign certificate
The EUR certificate containing the EUR.PK public key to be used for verification of the MSCA_Card certificate.
The EUR certificate whose validity period directly precedes the validity period of the EUR certificate to be used to verify the MSCA_Card certificate, if existing.
The link certificate linking these two EUR certificates, if existing.
[F12Additionally, for control cards, company cards and workshop cards only, and only if such cards are issued during the first three months of the validity period of a new EUR certificate: the EUR certificate that is two generations older, if existing.
Note to last bullet: For example, in the first three months of the ERCA(3) certificate (see Figure 1), the mentioned cards shall contain the ERCA(1) certificate. This is needed to ensure that these cards can be used to perform data downloads from ERCA(1) VUs whose normal 15-year life period plus the 3-months data downloading period expires during these months; see the last bullet of requirement 13) in Annex IC.]U.K.
Note: as explained in section 11.3.3, an EGF may potentially use its private key for mutual authentication towards the VU it is already coupled to, even after the corresponding certificate has expired.U.K.
Note: This requirement does not forbid the possibility of replacing EGF key pairs during a refurbishment or repair in a secure environment controlled by the EGF manufacturer.U.K.
The EGF_MA private key and corresponding certificate
The MSCA_VU-EGF certificate containing the MSCA_VU-EGF.PK public key to be used for verification of the EGF_MA certificate
The EUR certificate containing the EUR.PK public key to be used for verification of the MSCA_VU-EGF certificate
The EUR certificate whose validity period directly precedes the validity period of the EUR certificate to be used to verify the MSCA_VU-EGF certificate, if existing
The link certificate linking these two EUR certificates, if existing
Figure 1 below shows how different generations of ERCA root certificates, ERCA link certificates, MSCA certificates and equipment (VU and card) certificates are issued and used over time:
Note: readers of this section are supposed to be familiar with the contents of [ISO 16844-3] describing the interface between a vehicle unit and a motion sensor. The pairing process between a VU and a motion sensor is described in detail in chapter 12 of this Appendix.U.K.
| Table 3 | ||||
| Keys for securing vehicle unit — motion sensor communication | ||||
a Storage of KM and KID is optional, as these keys can be derived from KM-VU, KM-WC and CV. | ||||
| Key | Symbol | Generated by | Generation method | Stored by |
|---|---|---|---|---|
| Motion Sensor Master Key — VU part | KM-VU | ERCA | Random | ERCA, MSCAs involved in issuing VUs certificates, VU manufacturers, vehicle units |
| Motion Sensor Master Key — Workshop part | KM-WC | ERCA | Random | ERCA, MSCAs, card manufacturers, workshop cards |
| Motion Sensor Master Key | KM | Not independently generated | Calculated as KM = KM-VU XOR KM-WC | ERCA, MSCAs involved in issuing motion sensors keys (optionally)a |
| Identification Key | KID | Not independently generated | Calculated as KID = KM XOR CV, where CV is specified in CSM_106 | ERCA, MSCAs involved in issuing motion sensors keys (optionally)a |
| Pairing Key | KP | Motion sensor manufacturer | Random | One motion sensor |
| Session Key | KS | VU (during pairing of VU and motion sensor) | Random | One VU and one motion sensor |
Note: The version number is used to distinguish different generations of these keys, as explained in detail in section 9.2.1.2.U.K.
[F2For 128-bit motion sensor master keys: CV = ‘B6 44 2C 45 0E F8 D3 62 0B 7A 8A 97 91 E4 5D 83’]
For 192-bit motion sensor master keys: CV = ‘72 AD EA FA 00 BB F4 EE F4 99 15 70 5B 7E EE BB 1C 54 ED 46 8B 0E F8 25’
For 256-bit motion sensor master keys: CV = ‘1D 74 DB F0 34 C7 37 2F 65 55 DE D5 DC D1 9A C3 23 D6 A6 25 64 CD BE 2D 42 0D 85 D2 32 63 AD 60’
Note: the constant vectors have been generated as follows:U.K.
Pi_10 = first 10 bytes of the decimal portion of the mathematical constant π = ‘24 3F 6A 88 85 A3 08 D3 13 19’
CV_128-bits = first 16 bytes of SHA-256(Pi_10)
CV_192-bits = first 24 bytes of SHA-384(Pi_10)
CV_256-bits = first 32 bytes of SHA-512(Pi_10)
Note: as explained in section 9.2.1.2, in fact a motion sensor manufacturer may have to generate multiple unique pairing keys for a single motion sensor.U.K.
Note: as explained in section 9.2.1.2, in fact a motion sensor manufacturer may have to insert multiple encrypted pairing keys and multiple encrypted serial numbers in a single motion sensor.U.K.
Note: doing so will allow a second-generation motion sensor to be coupled to a first-generation VU.U.K.
Figure 2
Issuance and usage of different generations of the motion sensor master key in vehicle units, motions sensors and workshop cards
Note: this implies that in the last year of the validity period of an ERCA certificate, workshop cards will be issued with three different generations of KM-WC, as shown in Figure 2.U.K.
Note: This implies that in the last year of the validity period of an ERCA certificate, motion sensors will be issued with encrypted data based on three different generations of KM, as shown in Figure 2.U.K.
Note: In case the motion sensor manufacturer chooses to generate a TDES-based pairing key for a second-generation motion sensor (see CSM_111), the manufacturer shall indicate to the MSCA that the TDES-based motion sensor master key must be used for encrypting this pairing key. This is because the length of a TDES key may be equal to that of an AES key, so the MSCA cannot judge from the key length alone.U.K.
Note: The version number is used to distinguish different generations of the DSRC master key, as explained in detail in section 9.2.2.2.U.K.
This VU serial number shall be identical to the vuSerialNumber element of VuIdentification, see Appendix 1 and to the Certificate Holder Reference in the VU’s certificates.
The VU serial number may not be known at the moment a vehicle unit manufacturer requests the VU-specific DSRC keys. In this case, the VU manufacturer shall send instead the unique certificate request ID it used when requesting the VU’s certificates; see CSM_153. This certificate request ID shall therefore be equal to the Certificate Holder Reference in the VU’s certificates.]
Step 1 (Extract):
PRK = HMAC-Hash (salt, IKM) where salt is an empty string ‘’ and IKM is KMDSRC.
Step 2 (Expand):
OKM = T(1), where
T(1) = HMAC-Hash (PRK, T(0) || info || ‘01’) with
T(0) = an empty string (‘’)
[F2info = VU serial number or certificate request ID, as specified in CSM_123]
K_VUDSRC_ENC = first L octets of OKM and
K_VUDSRC_MAC = last L octets of OKM
where L is the required length of K_VUDSRC_ENC and K_VUDSRC_MAC in octets.
Note: as explained in section 9.2.2.2, in fact multiple generations of KMDSRC may have to be inserted in a single workshop card or control card.U.K.
Figure 3
Issuance and usage of different generations of the DSRC master key in vehicle units, workshop cards and control cards
Note: this implies that in the last two years of the validity period of an ERCA certificate, control cards will be issued with three different generations of KMDSRC, as shown in Figure 3.U.K.
Note: this implies that in the last year of the validity period of an ERCA certificate, workshop cards will be issued with three different generations of KMDSRC, as shown in Figure 3.U.K.
Note: this encoding results in a Tag-Length-Value (TLV) structure as follows:U.K.
:
The tag is encoded in one or two octets and indicates the content.
:
The length is encoded as an unsigned integer in one, two, or three octets, resulting in a maximum length of 65 535 octets. The minimum number of octets shall be used.
:
The value is encoded in zero or more octets
Note: the Field ID will be used in later sections of this Appendix to indicate individual fields of a certificate, e.g. X.CAR is the Certificate Authority Reference mentioned in the certificate of user X.U.K.
The Public Key nests two data elements: the standardized domain parameters to be used with the public key in the certificate and the value of the public point.
[F12Note: For a card certificate, the value of the CHR shall be equal to the value of the cardExtendedSerialNumber in EF_ICC; see Appendix 2. For an EGF certificate, the value of the CHR shall be equal to the value of the sensorGNSSSerialNumber in EF_ICC; see Appendix 14. For a VU certificate, the value of the CHR shall be equal to the vuSerialNumber element of VuIdentification, see Appendix 1, unless the manufacturer does not know the manufacturer-specific serial number at the time the certificate is requested.]U.K.
The Certificate Profile Identifier of the requested certificate
The Certificate Authority Reference expected to be used for signing the certificate.
The Public Key to be signed
The numerical nation code of the Certification Authority (data type defined in Appendix 1)
The alphanumerical nation code of the Certification Authority (data type defined in Appendix 1)
The 1-byte serial number to distinguish the different keys of the Certification Authority in the case keys are changed
The two-byte field containing Certification Authority specific additional info
If known (see CSM_154), a serial number for the equipment, unique for the manufacturer, the equipment's type and the month of manufacturing. Otherwise, a unique certificate request identifier.
The month and the year of equipment manufacturing or of the certificate request.
The manufacturer shall ensure that this data is correct and that the certificate returned by the MSCA is inserted in the intended equipment.]
First, each party shall demonstrate to the other that it owns a valid public key certificate, signed by a Member State Certificate Authority. In turn, the MSCA public key certificate must be signed by the European root certificate authority. This step is called certificate chain verification and is specified in detail in section 10.2
Second, the vehicle unit shall demonstrate to the card that it is in possession of the private key corresponding to the public key in the presented certificate. It does so by signing a random number sent by the card. The card verifies the signature over the random number. If this verification is successful, the VU is authenticated. This step is called VU Authentication and is specified in detail in section 10.3.
Third, both parties independently calculate two AES session keys using an asymmetric key agreement algorithm. Using one of these session keys, the card creates a message authentication code (MAC) over some data sent by the VU. The VU verifies the MAC. If this verification is successful, the card is authenticated. This step is called Card Authentication and is specified in detail in section 10.4.
Fourth, the VU and the card shall use the agreed session keys to ensure the confidentiality, integrity and authenticity of all exchanged messages. This is called Secure Messaging and is specified in detail in section 10.5.
The CHA field of the Card certificate shall indicate a card certificate for mutual authentication (see Appendix 1, data type EquipmentType).
The CHA of the Card.CA certificate shall indicate an MSCA.
The CHA of the Card.Link certificate shall indicate the ERCA.]
Note: There are three ways in which the VU may know the Card.CA.EUR certificate:U.K.
the Card.CA.EUR certificate is the same certificate as the VU's own EUR certificate;
the Card.CA.EUR certificate precedes the VU's own EUR certificate and the VU contained this certificate already at issuance (see CSM_81);
the Card.CA.EUR certificate succeeds the VU's own EUR certificate and the VU received a link certificate in the past from another tachograph card, verified it and stored it for future reference.
The CHA of the VU.Link certificate shall indicate the ERCA.
The CHA of the VU.CA certificate shall indicate an MSCA.
The CHA field of the VU certificate shall indicate a VU certificate for mutual authentication (see Appendix 1, data type EquipmentType).]
Second-generation ERCA link certificates
Second-generation MSCA certificates
Second-generation VU certificates issued by the same country as the card's own card certificate(s).
Note: the last requirement implies that a card shall be able to recognize the CAR of the VU certificate, i.e. the MSCA_VU-EGF certificate. This will not be the same as the CAR of its own certificate, which is the MSCA_Card certificate.U.K.
Note: This ensures that the card to which the VU authenticates itself is the same card whose certificate chain the VU has verified previously.U.K.
Note: This ensures that the VU with which a card communicates during a Secure Messaging session is the same VU that was authenticated by the card.U.K.
Calculate the authentication token by concatenating Card.CHR, the card challenge rcard and the identifier of the VU ephemeral public key Comp(VU.PKeph),
Verify the VU’s signature using the ECDSA algorithm, using the hashing algorithm linked to the key size of the VU’s VU_MA key pair as specified in CSM_50, in combination with VU.PK and the calculated authentication token.]
The vehicle unit initiates the Chip Authentication process by sending the MSE: Set AT command indicating ‘Chip Authentication using the ECDH algorithm resulting in an AES session key length linked to the key size of the card's Card_MA key pair, as specified in CSM_50’. The VU shall determine the key size of the card's key pair from the card certificate.
[F2The VU sends the public point VU.PK eph of its ephemeral key pair to the card. The public point shall be converted to an octet string as specified in [TR-03111]. The uncompressed encoding format shall be used. As explained in CSM_164, the VU generated this ephemeral key pair prior to the verification of the VU certificate chain. The VU sent the identifier of the ephemeral public key Comp(VU.PK eph ) to the card, and the card stored it.]
The card computes Comp(VU.PKeph) from VU.PKeph and compares this to the stored value of Comp(VU.PKeph).
Using the ECDH algorithm in combination with the card's static private key and the VU's ephemeral public key, the card computes a secret K.
The card chooses a random 8-byte nonce NPICC and uses it to derive two AES session keys KMAC and KENC from K. See CSM_179.
[F2Using K MAC , the card computes an authentication token over the VU ephemeral public point: T PICC = CMAC(K MAC , VU.PK eph ). The public point shall be in the format used by the VU (see bullet 2 above). The card sends N PICC and T PICC to the vehicle unit.]
Using the ECDH algorithm in combination with the card's static public key and the VU's ephemeral private key, the VU computes the same secret K as the card did in step 4.
The VU derives session keys KMAC and KENC from K and NPICC; see CSM_179.
The VU verifies the authentication token TPICC.
The value of the counter shall be ‘00 00 00 01’ for KENC and ‘00 00 00 02’ for KMAC.
The optional nonce r shall be used and shall be equal to NPICC.
For deriving 128-bits AES keys, the hashing algorithm to be used shall be SHA-256.
For deriving 192-bits AES keys, the hashing algorithm to be used shall be SHA-384.
For deriving 256-bits AES keys, the hashing algorithm to be used shall be SHA-512.
The length of the session keys (i.e. the length at which the hash is truncated) shall be linked to the size of the Card_MA key pair, as specified in CSM_50.
| Table 5 | |||
| Secure Messaging Data Objects | |||
| Data Object Name | Tag | Presence (M)andatory, (C)onditional or (F)orbidden in | |
|---|---|---|---|
| Commands | Responses | ||
| Plain value not encoded in BER-TLV | ‘81’ | C | C |
| Plain value encoded in BER-TLV, but not including SM DOs | ‘B3’ | C | C |
| Padding-content indicator followed by cryptogram, plain value not encoded in BER-TLV | ‘87’ | C | C |
| Protected Le | ‘97’ | C | F |
| Processing Status | ‘99’ | F | M |
| Cryptographic Checksum | ‘8E’ | M | M |
Note: As specified in Appendix 2, tachograph cards may support the READ BINARY and UPDATE BINARY command with an odd INS byte (‘B1’ resp. ‘D7’). These command variants are required to read and update files with more than 32 768 bytes or more. In case such a variant is used, a data object with tag ‘B3’ shall be used instead of an object with tag ‘81’. See Appendix 2 for more information.U.K.
:
The tag is encoded in one or two octets and indicates the content.
:
The length is encoded as an unsigned integer in one, two, or three octets, resulting in a maximum length of 65 535 octets. The minimum number of octets shall be used.
:
The value is encoded in zero or more octets
The command header shall be included in the MAC calculation, therefore value ‘0C’shall be used for the class byte CLA.
As specified in Appendix 2, all INS bytes shall be even, with the possible exception of odd INS bytes for the READ BINARY and UPDATE BINARY commands.
The actual value of Lc will be modified to Lc' after application of secure messaging.
The Data field shall consist of SM data objects.
In the protected command APDU the new Le byte shall be set to ‘00’. If required, a data object ‘97’ shall be included in the Data field in order to convey the original value of Le.
Note: Padding for Secure Messaging is always performed by the secure messaging layer, not by the CMAC or CBC algorithms.U.K.
A command APDU with applied Secure Messaging will have the following structure, depending on the case of the respective unsecured command (DO is data object):
:
CLA INS P1 P2 || Lc' || DO ‘8E’ || Le
:
CLA INS P1 P2 || Lc' || DO ‘97’ || DO‘8E’ || Le
:
CLA INS P1 P2 || Lc' || DO ‘81’ || DO‘8E’ || Le
:
CLA INS P1 P2 || Lc' || DO ‘B3’ || DO‘8E’ || Le
:
CLA INS P1 P2 || Lc' || DO ‘81’ || DO‘97’ || DO‘8E’ || Le
:
CLA INS P1 P2 || Lc' || DO ‘B3’ || DO‘97’ || DO‘8E’ || Le
where Le = ‘00’ or ‘00 00’ depending on whether short length fields or extended length fields are used; see [ISO 7816-4].
A response APDU with applied Secure Messaging will have the following structure, depending on the case of the respective unsecured response:
:
DO ‘99’ || DO ‘8E’ || SW1SW2
:
DO ‘81’ || DO ‘99’ || DO ‘8E’ || SW1SW2
:
DO ‘87’ || DO ‘99’ || DO ‘8E’ || SW1SW2
:
DO ‘B3’ || DO ‘99’ || DO ‘8E’ || SW1SW2
Note: Case 2 or 4 (odd INS byte) with encryption is never used in the communication between a VU and a card.U.K.
Below are three example APDU transformations for commands with even INS code. Figure 8 shows an authenticated Case 4 command APDU, Figure 9 shows an authenticated Case 1/Case 3 response APDU, and Figure 10 shows an encrypted and authenticated Case 2/Case 4 response APDU.
it receives a plain response APDU,
it detects a Secure Messaging error in a response APDU:
An expected Secure Messaging data object is missing, the order of data objects is incorrect, or an unknown data object is included.
A Secure Messaging data object is incorrect, e.g. the MAC value is incorrect, the TLV structure is incorrect or the padding indicator in tag ‘87’ is not equal to ‘01’.
the card sends a status byte indicating it detected an SM error (see CSM_194),
the limit for the number of commands and associated responses within the current session is reached. For a given VU, this limit shall be defined by its manufacturer, taking into account the security requirements of the hardware used, with a maximum value of 240 SM commands and associated responses per session.
it receives a plain command APDU,
it detects a Secure Messaging error in a command APDU:
An expected Secure Messaging data object is missing, the order of data objects is incorrect, or an unknown data object is included.
A Secure Messaging data object is incorrect, e.g. the MAC value is incorrect or the TLV structure is incorrect.
it is depowered or reset,
the VU starts the VU Authentication process,
the limit for the number of commands and associated responses within the current session is reached. For a given card, this limit shall be defined by its manufacturer, taking into account the security requirements of the hardware used, with a maximum value of 240 SM commands and associated responses per session.]
If in a command APDU some expected Secure Messaging data objects are missing, the order of data objects is incorrect or unknown data objects are included, a tachograph card shall respond with status bytes ‘69 87’.
If a Secure Messaging data object in a command APDU is incorrect, a tachograph card shall respond with status bytes ‘69 88’.
In such a case, the status bytes shall be returned without using SM.
securely destroy the stored session keys
immediately establish a new Secure Messaging session, as described in sections 10.2 — 10.5.
Note that Figure 11 in essence consists of the first steps shown in Figure 4 and Figure 5. Again, note that since an EGF is not a smart card, the VU will probably not send a Reset to initiate the communication and will not receive an ATR. In any case this is out of the scope of this Appendix.U.K.
Note: readers of this chapter are supposed to be familiar with the contents of [ISO 16844-3].U.K.
As explained in section 9.2.1, the motion sensor master key and all associated keys are regularly replaced. This leads to the presence of up to three motion sensor-related AES keys KM-WC (of consecutive key generations) in workshop cards. Similarly, in motion sensors up to three different AES-based encryptions of data (based on consecutive generations of the motion sensor master key KM) may be present. A vehicle unit contains only one motion sensor-related key KM-VU.
A second-generation workshop card is inserted into the VU and the VU is connected to the motion sensor.
The VU reads all available KM-WC keys from the workshop card, inspects their key version numbers and chooses the one matching the version number of the VU's KM-VU key. If the matching KM-WC key is not present on the workshop card, the VU aborts the pairing process and shows an appropriate error message to the workshop card holder.
The VU calculates the motion sensor master key KM from KM-VU and KM-WC, and the identification key KID from KM, as specified in section 9.2.1.
The VU sends the instruction to initiate the pairing process towards the motion sensor, as described in [ISO 16844-3], and encrypts the serial number it receives from the motion sensor with the identification key KID. The VU sends the encrypted serial number back to the motion sensor.
The motion sensor matches the encrypted serial number consecutively with each of the encryptions of the serial number it holds internally. If it finds a match, the VU is authenticated. The motion sensor notes the generation of KID used by the VU and returns the matching encrypted version of its pairing key; i.e. the encryption that was created using the same generation of KM.
The VU decrypts the pairing key using KM, generates a session key KS, encrypts it with the pairing key and sends the result to the motion sensor. The motion sensor decrypts KS.
The VU assembles the pairing information as defined in [ISO 16844-3], encrypts the information with the pairing key, and sends the result to the motion sensor. The motion sensor decrypts the pairing information.
The motion sensor encrypts the received pairing information with the received KS and returns this to the VU. The VU verifies that the pairing information is the same information which the VU sent to the motion sensor in the previous step. If it is, this proves that the motion sensor used the same KS as the VU and hence in step 5 sent its pairing key encrypted with the correct generation of KM. Hence, the motion sensor is authenticated.
Note that steps 2 and 5 are different from the standard process in [ISO 16844-3]; the other steps are standard.U.K.
Example: Suppose a pairing takes place in the first year of the validity of the ERCA (3) certificate; see Figure 2 in section 9.2.1.2. Moreover
Suppose the motion sensor was issued in the last year of the validity of the ERCA (1) certificate. It will therefore contain the following keys and data:
Ns[1]: its serial number encrypted with generation 1 of KID,
Ns[2]: its serial number encrypted with generation 2 of KID,
Ns[3]: its serial number encrypted with generation 3 of KID,
KP[1]: its generation-1 pairing key(22), encrypted with generation 1 of KM,
KP[2]: its generation-2 pairing key, encrypted with generation 2 of KM,
KP[3]: its generation-3 pairing key, encrypted with generation 3 of KM,
Suppose that the workshop card was issued in the first year of the validity of the ERCA (3) certificate. It will therefore contain the generation 2 and generation 3 of the KM-WC key.
Suppose the VU is a generation-2 VU, containing the generation 2 of KM-VU.
In this case, the following will happen in steps 2 — 5:
Step 2: The VU reads generation 2 and generation 3 of KM-WC from the workshop card and inspects their version numbers.
Step 3: The VU combines the generation-2 KM-WC with its KM-VU to compute KM and KID.
Step 4: The VU encrypts the serial number it receives from the motion sensor with KID.
Step 5: The motion sensor compares the received data with Ns[1] and doesn't find a match. Next, it compares the data with Ns[2] and finds a match. It concludes that the VU is a generation-2 VU, and therefore sends back KP[2].
| [F2Table 6 | |||||||
| Number of plaintext and encrypted data bytes per instruction defined in [ISO 16844-3] | |||||||
| Instruction | Request / reply | Description of data | # of plaintext data bytes according to [ISO 16844-3] | # of plaintext data bytes using AES keys | # of encrypted data bytes when using AES keys of bitlength | ||
|---|---|---|---|---|---|---|---|
| 128 | 192 | 256 | |||||
| 10 | request | Authentication data + file number | 8 | 8 | 16 | 16 | 16 |
| 11 | reply | Authentication data + file contents | 16 or 32, depend on file | 16 or32, depend on file | 32 / 48 | 32 / 48 | 32 / 48 |
| 41 | request | MoS serial number | 8 | 8 | 16 | 16 | 16 |
| 41 | reply | Pairing key | 16 | 16 / 24 / 32 | 16 | 32 | 32 |
| 42 | request | Session key | 16 | 16 / 24 / 32 | 16 | 32 | 32 |
| 43 | request | Pairing information | 24 | 24 | 32 | 32 | 32 |
| 50 | reply | Pairing information | 24 | 24 | 32 | 32 | 32 |
| 70 | request | Authentication data | 8 | 8 | 16 | 16 | 16 |
| 80 | reply | MoS counter value + auth. data | 8 | 8 | 16 | 16 | 16] |
In case the pairing key KP is 16 bytes long: K'p = KP XOR (Ns||Ns)
In case the pairing key KP is 24 bytes long: K'p = KP XOR (Ns||Ns||Ns)
In case the pairing key KP is 32 bytes long: K'p = KP XOR (Ns||Ns||Ns||Ns)
where Ns is the 8-byte serial number of the motion sensor.
Note: in [ISO 16844-3], the number of plaintext data bytes is always a multiple of 8, such that padding is not necessary when using TDES. The definition of data and messages in [ISO 16844-3] is not changed by this part of this Appendix, thus necessitating the application of padding.U.K.
For instruction 11: the 8-byte authentication block specified in section 7.6.3.3 of [ISO 16844-3], padded using padding method 2 defined in [ISO 9797-1]; see also section 7.6.5 and 7.6.6 of [ISO 16844-3].
For all other instructions in which more than 16 bytes are transferred, as specified in Table 6: ‘00’ {16}, i.e. sixteen bytes with binary value 0.
Note: As shown in section 7.6.5 and 7.6.6 of [ISO 16844-3], when the MoS encrypts data files for inclusion in instruction 11, the authentication block is bothU.K.
Used as the initialization vector for the CBC-mode encryption of the data files
Encrypted and included as the first block in the data that is sent to the VU.
As specified in Appendix 14, a VU regularly generates Remote Tachograph Monitoring (RTM) data and sends this data to the (internal or external) Remote Communication Facility (RCF). The remote communication facility is responsible for sending this data over the DSRC interface described in Appendix 14 to the remote interrogator. Appendix 1 specifies that the RTM data is the concatenation of:
the encryption of the plaintext tachograph payload
described below
The plaintext tachograph payload data format is specified in Appendix 1 and further described in Appendix 14. This section describes the structure of the DSRC security data; the formal specification is in Appendix 1.
a 3-byte counter, see CSM_225
the VU’s serial number or certificate request ID (data type VuSerialNumber or CertificateRequestID) – see CSM_123]
the 1-byte version number of the DSRC master key from which the VU-specific DSRC keys were derived, see section 9.2.2.
the MAC calculated over all previous bytes in the RTM data.
The control card shall inspect the DSRC master key version number in the DSRC security data. If the control card does not know the indicated DSRC master key, it shall return an error specified in Appendix 2 and abort the process.
[F2The control card shall use the indicated DSRC master key in combination with the VU serial number or the certificate request ID in the DSRC security data to derive the VU-specific DSRC keys K_VU DSRC _ENC and K_VU DSRC _MAC, as specified in CSM_124.]
The control card shall use K_VUDSRC_MAC to verify the MAC in the DSRC security data, as specified in CSM_227. If the MAC is incorrect, the control card shall return an error specified in Appendix 2 and abort the process.
The control card shall use K_VUDSRC_ENC to decrypt the encrypted tachograph payload, as specified in CSM_226. The control card shall remove the padding and shall return the decrypted tachograph payload data to the remote interrogator.
In case of a VU download:
The VU_Sign certificate
The MSCA_VU-EGF certificate containing the public key to be used for verification of the VU_Sign certificate
In case of a Card download:
The Card_Sign certificate
The MSCA_Card certificate containing the public key to be used for verification of the Card_Sign certificate
In case it uses a control card to verify the signature, as shown in Figure 13: The link certificate linking the latest EUR certificate to the EUR certificate whose validity period directly precedes it, if existing.
In case it verifies the signature itself: all valid European root certificates.
Note: the method the IDE uses to retrieve these certificates is not specified in this Appendix.U.K.
Second-generation ERCA link certificates
Second-generation MSCA certificates
Second-generation VU_Sign or Card_Sign certificates issued by the same country as the control card’s own card certificate.
In case it performs signature verification itself, the IDE shall verify the authenticity and validity of all certificates in the certificate chain in the data file, and it shall verify the signature over the data following the signature scheme defined in [DSS]. In both cases, for every certificate read from the data file, it is necessary to verify that the Certificate Holder Authorisation (CHA) field is correct:
The CHA field of the EQT certificate shall indicate a VU or Card (as applicable) certificate for signing (see Appendix 1, data type EquipmentType).
The CHA of the EQT.CA certificate shall indicate an MSCA.
The CHA of the EQT.Link certificate shall indicate the ERCA.]
Note: This document does not specify any action to undertake if a signature over a downloaded data file cannot be verified or if the verification is unsuccessful.U.K.
This Appendix provides the technical requirements for the GNSS data used by the Vehicle Unit, including the protocols that must be implemented to assure the secure and correct data transfer of the positioning information.
The main articles in this Regulation (EU) No 165/2014 driving these requirements are: ‘Article 8 Recording of the position of the vehicle at certain points during the daily working period’, ‘Article 10 Interface with Intelligent Transport Systems’ and ‘Article 11 Detailed provisions for smart tachographs’.
The Vehicle Unit may be with or without an external GNSS facility as described in Figure 1:
The following acronyms are used in this appendix:
Dilution of Precision
Elementary file GNSS Facility
European Geostationary Navigation Overlay Service
Global Navigation Satellite System
GPS DOP and active satellites
Horizontal Dilution of Precision
Interface Control Document
National Marine Electronics Association
Position Dilution of Precision
Recommended Minimum Specific
Signal in Space
Vertical Dilution of Precision
Vehicle Unit
Regardless of the configuration of the Smart Tachograph with or without an external GNSS facility, the provision of accurate and reliable positioning information is an essential element of the effective operation of the Smart Tachograph. Therefore, it is appropriate to require its compatibility with the services provided by the Galileo and European Geostationary Navigation Overlay Service (EGNOS) programmes as set out in Regulation (EU) No 1285/2013 of the European Parliament and of the Council(23). The system established under the Galileo programme is an independent global satellite navigation system and the one established under the EGNOS programme is a regional satellite navigation system improving the quality of the Global Positioning System signal.
This section describes the NMEA sentences used in the functioning of the Smart Tachograph. This section is valid both for the configuration of the Smart Tachograph with or without an external GNSS facility.
The format of the RMC sentence is the following (as from NMEA V4.1 standard):
The Status gives indication if the GNSS signal is available. Until the value of the Status is not set to A, the received data (e.g., on Time or Latitude/Longitude) cannot be used to record the position of the vehicle in the VU.
[F2The resolution of the position is based on the format of the RMC sentence described above. The first part of the fields 3) and 5) are used to represent the degrees. The rest are used to represent the minutes with three decimals. So the resolution is 1/1000 of minute or 1/60000 of degree (because one minute is 1/60 of a degree).]
The GPS DOP and active satellites (GSA) command can be used by the VU to determine and record the signal availability and accuracy. In particular the HDOP is used to provide an indication on the level of accuracy of the recorded location data (see 4.2.2). The VU will store the value of the Horizontal Dilution of Precision (HDOP) calculated as the minimum of the HDOP values collected on the available GNSS systems.
The GNSS Id. indicates the corresponding NMEA Id. for every GNSS constellation and Satellite-Based Augmentation System (SBAS).
In this configuration, the GNSS receiver is a part of the external GNSS facility.
A commercial GNSS receiver to provide the position data through the GNSS data interface. For example, the GNSS data interface can be NMEA standard V4.10 where The GNSS receiver acts as a talker and transmit NMEA sentences to the GNSS Secure Transceiver with a frequency of 1Hz for the pre-defined set of NMEA sentences, which must include at least the RMC and GSA sentences. The implementation of the GNSS data interface is a choice of the manufacturers of the external GNSS facility.
A transceiver unit (GNSS Secure Transceiver) with the capability to support standard ISO/IEC 7816-4:2013 (see 4.2.1) to communicate with the vehicle unit and support the GNSS data interface to the GNSS receiver. The unit is provided with a memory to store the identification data of the GNSS receiver and external GNSS facility.
An enclosure system with tamper detection function, which encapsulate both the GNSS receiver and the GNSS Secure Transceiver. The tamper detection function shall implement the security protection measures as requested in the Protection Profile of the Smart Tachograph.
A GNSS antenna installed on the vehicle and connected to the GNSS receiver through the enclosure system.
the interface to the GNSS antenna installed on the vehicle truck, if an external antenna is used.
the interface to the Vehicle Unit.
the EGF_MA key pair and corresponding certificate,
the MSCA_VU-EGF certificate containing the MSCA_VU-EGF.PK public key to be used for verification of the EGF_MA certificate,
the EUR certificate containing the EUR.PK public key to be used for verification of the MSCA_VU-EGF certificate,
the EUR certificate whose validity period directly precedes the validity period of the EUR certificate to be used to verify the MSCA_VU-EGF certificate, if existing,
the link certificate linking these two EUR certificates, if existing,
the extended serial-number of the external GNSS facility,
operating system identifier of the GNSS facility,
type approval number of the external GNSS facility;
Identifier of the security component of the external GNSS module.
The collection and distribution of GNSS data (e.g., position, timing, speed),
The collection of the configuration data of the external GNSS facility,
The management protocol to support the coupling, mutual authentication and session key agreement between the external GNSS facility and the VU.
The mapping of record numbers and data is provided in Table 1. Note that there are five GSA sentences for the GNSS constellations and Satellite-Based Augmentation System (SBAS).]
| Table 1 | ||||
| File Structure | ||||
| Access conditions | ||||
|---|---|---|---|---|
| File | File ID | Read | Update | Encrypted |
| MF | 3F00 | |||
| EF.ICC | 0002 | ALW | NEV (by VU) | No |
| DF GNSS Facility | 0501 | ALW | NEV | No |
| EF EGF_MACertificate | C100 | ALW | NEV | No |
| EF CA_Certificate | C108 | ALW | NEV | No |
| EF Link_Certificate | C109 | ALW | NEV | No |
| EF.EGF | 2F2F | SM-MAC | NEV (by VU) | No |
| File / Data element | Record no | Size (bytes) | Default values | |
|---|---|---|---|---|
| Min | Max | |||
| MF | 552 | 1 031 | ||
| EF.ICC | ||||
| sensorGNSSSerialNumber | 8 | 8 | ||
| DF GNSS Facility | 612 | 1 023 | ||
| EF EGF_MACertificate | 204 | 341 | ||
| EGFCertificate | 204 | 341 | {00..00} | |
| EF CA_Certificate | 204 | 341 | ||
| MemberStateCertificate | 204 | 341 | {00..00} | |
| EF Link_Certificate | 204 | 341 | ||
| LinkCertificate | 204 | 341 | {00..00} | |
| EF.EGF | ||||
| RMC NMEA Sentence | ‘01’ | 85 | 85 | |
| 1st GSA NMEA Sentence | ‘02’ | 85 | 85 | |
| 2nd GSA NMEA Sentence | ‘03’ | 85 | 85 | |
| 3rd GSA NMEA Sentence | ‘04’ | 85 | 85 | |
| 4th GSA NMEA Sentence | ‘05’ | 85 | 85 | |
| 5th GSA NMEA Sentence | ‘06’ | 85 | 85 | |
| Extended serial-number of the external GNSS facility defined in Appendix 1 as SensorGNSSSerialNumber. | ‘07’ | 8 | 8 | |
| Operating system identifier of the GNSS Secure Transceiver defined in Appendix 1 as SensorOSIdentifier. | ‘08’ | 2 | 2 | |
| Type approval number of the external GNSS facility defined in Appendix 1 as SensorExternalGNSSApprovalNumber. | ‘09’ | 16 | 16 | |
| Identifier of the security component of the external GNSS facility defined in Appendix 1 as SensorExternalGNSSSCIdentifier | ‘10’ | 8 | 8 | |
| RFU — Reserved for Future Use | From ‘11’ to ‘FD’ | |||
The coupling process has been completed as described in Appendix 11. Common security mechanisms.
The periodic mutual authentication and session key agreement between the VU and the external GNSS facility also described in Appendix 11. Common security mechanisms has been executed with the indicated frequency.
The VU requests location data from the External GNSS facility together with Dilution of Precision data (from the GSA NMEA sentence). The VU Secure Transceiver shall use the ISO/IEC 7816-4:2013 SELECT and READ RECORD(S) command in secure messaging authentication-only mode as described in Appendix 11 section 11.5 with the file identifier ‘2F2F’ and RECORD number equal to ‘01’ for RMC NMEA sentence and ‘02’,‘03’,‘04’,‘05’,‘06’ for GSA NMEA sentence.
The last location data received is stored in the EF with identifier ‘2F2F’ and the records described in Table 1 in the GNSS secure transceiver as the GNSS secure transceiver receives NMEA data with a frequency of at least 1 Hz from the GNSS receiver through the GNSS data interface.
The GNSS Secure Transceiver sends the response to the VU Secure Transceiver by using the APDU response message in secure messaging authentication-only mode as described in Appendix 11 section 11.5.
The VU Secure Transceiver checks the authenticity and integrity of the received response. In case of positive outcome, the location data is transferred to the VU processor through the GNSS data interface.
[F2The VU processor checks the received data extracting the information (e.g., latitude, longitude, time) from the RMC NMEA sentence. The RMC NMEA sentence includes the information if the position is valid. If the position is not valid, the location data is not available yet and it cannot be used to record the position of the vehicle. If the position is valid, the VU processor also extracts the values of HDOP from GSA NMEA sentences and calculate the minimum value on the available satellite systems (i.e., when the fix is available).]
The VU processor stores the received and processed information such as latitude, longitude, time and speed in the VU in the format defined in Appendix 1 Data Dictionary as GeoCoordinates together with the value of HDOP calculated as the minimum of the HDOP values collected on the available GNSS systems.
This section describes in detail the structure of the Read Record command. Secure messaging (authentication-only mode) is added as described in Appendix 11 Common security mechanisms.
| Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | ‘0Ch’ | Secure messaging asked. |
| INS | 1 | ‘B2h’ | Read Record |
| P1 | 1 | ‘XXh’ | Record number (‘00’ references the current record) |
| P2 | 1 | ‘04h’ | Read the record with the record number indicated in P1 |
| Le | 1 | ‘XXh’ | Length of data expected. Number of Bytes to be read. |
| Byte | Length | Value | Description |
|---|---|---|---|
| #1-#X | X | ‘XX..XXh’ | Data read |
| SW | 2 | ‘XXXXh’ | Status Words (SW1,SW2) |
If the command is successful, the GNSS secure transceiver returns ‘9000’.
If the current file is not record oriented, the GNSS secure transceiver returns ‘6981’.
If the command is used with P1 = ‘00’ but there is no current EF the GNSS secure transceiver returns ‘6986’ (command not allowed).
If the record is not found, the GNSS secure transceiver returns ‘6A 83’.
If the external GNSS facility has detected tampering, it shall return status words ‘66 90’.
| Command | Reference |
|---|---|
| Select | Appendix 2 chapter 3.5.1 |
| Read Binary | Appendix 2 chapter 3.5.2 |
| Get Challenge | Appendix 2 chapter 3.5.4 |
| PSO: Verify Certificate | Appendix 2 chapter 3.5.7 |
| External Authenticate | Appendix 2 chapter 3.5.9 |
| General Authenticate | Appendix 2 chapter 3.5.10 |
| MSE:SET | Appendix 2 chapter 3.5.11 |
The coupling, mutual authentication and session key agreement of the external GNSS facility with the vehicle unit is described in Appendix 11. Common security mechanisms, Chapter 11.
This section describes how potential error conditions by the external GNSS facility are addressed and recorded in the VU.
In this configuration, the GNSS receiver is inside the Vehicle Unit as described in Figure 1.
If the VU detects a discrepancy of more than 1 minute between the time of the vehicle unit's time measurement function and the time originating from the GNSS receiver, the VU will record an event of type EventFaultType enum ‘ 0B ’ H Time conflict (GNSS versus VU internal clock) . After a time conflict event has been triggered, the VU will not check the time discrepancy for the next 12 hours. This event shall not be triggered in cases no valid GNSS signal was detectable by the GNSS receiver within the last 30 days.]
every 10 seconds maximum, the absolute value of the difference between the vehicle speed estimated from the GNSS and the one estimated from the motion sensor shall be computed.
all the computed values in a time window containing the last five minutes of movement shall be used to compute the median value.
the median value shall be computed as the average of 80 % of the remaining values, after having eliminated the highest ones in absolute values
The Vehicle Motion Conflict event shall be triggered if the median value is above 10 Km/h for five uninterrupted minutes of vehicle movement. Other independent sources of vehicle motion detection may optionnally be used, so that a more reliable detection of tachograph manipulations is provided. (Note: the use of the median on the last 5 minutes is applied to mitigate the risk of measurement outliers and transient values). This event shall not be triggered in the following conditions: (a) during a ferry/train crossing, (b) when the position information from the GNSS receiver shall not be available and (c) while in calibration mode.
This Appendix specifies the design and the procedures to follow in order to implement the interface with Intelligent Transport Systems (ITS) as required in Article 10 of Regulation (EU) No. 165/2014 (the Regulation).
The Regulation specifies that the tachographs of vehicles may be equipped with standardised interfaces allowing the data recorded or produced by tachograph to be used in operational mode, by an external device, provided that the following conditions are met:
the interface does not affect the authenticity and the integrity of the data of the tachograph;
the interface complies with the detailed provisions of Article 11 of the Regulation;
the external device connected to the interface has access to personal data, including geopositioning data, only after the verifiable consent of the driver to whom the data relates.
The scope of this Appendix is to specify how applications hosted on external devices can via a Bluetooth® connection obtain data (the Data) from a tachograph.
The Data available via this interface is described in the Annex 1 of the present document. This interface does not prohibit the implementation of other interfaces (e.g. via the CAN bus) to transmit the data of the VU to other vehicle processing units.
This Appendix specifies:
The Data available through the ITS interface
The Bluetooth® profile that is used to transfer the data
The enquiry and download procedures and sequence of operations
The pairing mechanism between the tachograph and the external device
The consent mechanism available to the driver
[F2For clarification, this Appendix does not specify:
The collection of the Data operation and management within the VU (which shall be specified elsewhere within the Regulation or otherwise shall be a function of product design).
The form of presentation of collected data to application hosted on the external device.
Data security provisions above what provides Bluetooth® (such as encryption) concerning the content of the Data (which shall be specified elsewhere within the Regulation [Appendix 11 Common Security Mechanisms]).
The Bluetooth® protocols used by the ITS interface]
The following acronyms and definitions specific to this Appendix are used in this appendix:
exchange of information/data between a master unit (i.e. the tachographs) and an external unit through the ITS interface over Bluetooth®.
Data sets as specified in Annex 1.
Regulation (EU) No 165/2014 of the European Parliament and of the Council of 4 February 2014 on tachographs in road transport, repealing Council Regulation (EEC) No 3821/85 on recording equipment in road transport and amending Regulation (EC) No 561/2006 of the European Parliament and of the Council on the harmonisation of certain social legislation relating to road transport
Basic Rate
Enhanced Data Rate
Global Navigation Satellite System
Identity Resolution Key
Intelligent Transport System
Low Energy
Personal Identification Number
Personal Unblocking Code
Service Identifier
Serial Port Profile
Secure Simple Pairing
Transfer Request Parameter
Transfer Response Parameter
Vehicle Unit
The specification defined in this Appendix refers to and depends upon all or parts of the following regulations and standards. Within the clauses of this Appendix the relevant standards, or relevant clauses of standards, are specified. In the event of any contradiction the clauses of this Appendix shall take precedence.
Regulations and standards referenced in this Appendix are:
Regulation (EU) No 165/2014 of the European Parliament and of the Council of 4 February 2014 on tachographs in road transport, repealing Council Regulation (EEC) No 3821/85 on recording equipment in road transport and amending Regulation (EC) No 561/2006 of the European Parliament and of the Council on the harmonisation of certain social legislation relating to road transport.
Regulation (EC) No 561/2006 of the European Parliament and of the Council of 15 March 2006 on the harmonisation of certain social legislation relating to road transport and amending Council Regulations (EEC) No 3821/85 and (EC) No 2135/98 and repealing Council Regulation (EEC) No 3820/85.
ISO 16844 — 4: Road vehicles — Tachograph systems — Part 4: Can interface
ISO 16844 — 7: Road vehicles — Tachograph systems — Part 7: Parameters
Bluetooth® — Serial Port Profile — V1.2
Bluetooth® — Core Version 4.2
NMEA 0183 V4.1 protocol
The VU shall be responsible to keep updated and maintain the data to be stored in the VU, without any involvement of the ITS interface. The means by which this is achieved is internal to the VU, specified elsewhere in the Regulation, and is not specified in this Appendix.
The VU shall be responsible to update the data that will be available through the ITS interface at a frequency determined within VU procedures, without any involvement of ITS interface. The VU data shall be used as a basis to populate and update the Data, the means by which this is achieved is specified elsewhere in the Regulation or if there is no such specification is a function of product design and is not specified in this Appendix.
The content of the Data shall be as specified in Annex 1 of this appendix.
ITS applications will be using the data made available through the ITS interface for instance to optimize driver activities management while respecting the Regulation, to detect possible faults of the tachograph or to use the GNSS data. The specification of the applications is not within the scope of this Appendix.
The Data exchange using the ITS interface shall be performed via a Bluetooth® interface compatible via version 4.2 or later. Bluetooth® operates in the unlicensed industrial, scientific and medical (ISM) band at 2.4 to 2.485 GHz. Bluetooth® 4.2 offers enhanced privacy and security mechanisms and increases speed and reliability of data transfers. For the purpose of this specification is Bluetooth® class 2 radio used with a range up to 10 meters. More information on Bluetooth® 4.2 is available on www.bluetooth.com (https://www.bluetooth.org/en-us/specification/adopted-specifications?_ga=1.215147412.2083380574.1435305676).
The Communication shall be established with the communications equipment after a pairing process has been completed by an authorized device. As Bluetooth® is using a master/slave model to control when and where devices can send data, the tachograph will play the role of master while the external device will be the slave.
[F2When an external device comes within range of the VU for the first time, the Bluetooth® pairing process can be initiated (see also annex 2). The devices share their addresses, names, and profiles and common secret key, which allows them to bond whenever they are together in the future. Once this step is completed, the external device is trusted and is in state to initiate requests to download data from the tachograph. It is not foreseen to add encryption mechanisms beyond what Bluetooth® provides. However, if additional security mechanisms are needed, this will be done in accordance with Appendix 11 Common Security Mechanisms.]
The overall communication principle is described in the following figure.
The SPP (Serial Port Profile) profile of Bluetooth® shall be used to transfer data from the VU to the external device.
[F2For security reasons, the VU will require a PIN code authorization system separated from the Bluetooth pairing. Each VU shall be able to generate PIN codes for authentication purposes composed of at least 4 digits. Every time an external device pairs with the VU, it must provide the correct PIN code before receiving any data.]
Succeeding entering the PIN shall result in putting the device on the whitelist. The whitelist shall store at least 64 devices paired with the particular VU.
Failing to provide the correct PIN code three times in a row shall result in putting temporarily the device on the blacklist. While blacklisted, every new attempt from the device shall be rejected. Further failure to provide the correct PIN code three times in a row shall result in increasingly longer ban duration (See table 1). Providing the correct PIN code shall reset the ban duration and the number of attempt. Figure 1 in Annex 2 represents the sequence diagram of a PIN validation attempt.
Ban duration depending on the number of consecutive failure to provide the correct PIN code
| Number of consecutive failure | Ban duration |
|---|---|
| 3 | 30 seconds |
| 6 | 5 minutes |
| 9 | 1 hour |
| 12 | 24 hours |
| 15 | Permanent |
Failing to provide the correct PIN code fifteen times (5×3) in a row shall result in a permanent blacklisting of the ITS Unit. Only providing the correct PUC code shall overturn this permanent ban.
The PUC code shall be composed of 8 digits and provided by the manufacturer with the VU. Failing to provide the correct PUC code ten times in a row will irrevocably blacklist the ITS Unit.
[F2While the manufacturer may offer an option to change the PIN code directly through the VU, the PUC code shall not be alterable. Modifying the PIN code, if possible, shall require to enter the current PIN code directly in the VU.]
Furthermore any devices stored in the whitelist shall be kept until manual removal of by the user (e.g. via the man-machine-interface of the VU or other means). By doing so lost or stolen ITS-units may be removed from the whitelist. Also, any ITS Unit leaving the Bluetooth connection range for more than 24 hours shall be automatically removed from the VU whitelist and must provide the correct PIN code again when the connection is established again.
The format of the messages between the VU interface and the VU are not provided but left to the discretion of the manufacturer. Said manufacturer shall however ensure the message format between the ITS Unit and the VU interface is respected (see ASN.1 specifications).
Any data request shall thus be met with the proper verification of the sender's credential before any form of treatment. Figure 2 of Annex 2 represents the sequence diagram for this procedure. Any blacklisted device shall receive an automatic rejection, any non-blacklisted non-whitelisted device shall receive a PIN request it needs to fulfill before resending its data request.
All messages exchanged between the ITS Unit and the VU interface shall be formatted with a structure consisting of three parts: A header composed by a target byte (TGT), a source byte (SRC) and a length byte (LEN).
The data field composed by a service identifier byte (SID) and a variable amount of data bytes (maximum 255).
The checksum byte is the 1 byte sum series modulo 256 of all the bytes of the message excluding the CS itself.
The message shall be Big Endian.
General message format
| Header | Data Field | Checksum | ||||||
|---|---|---|---|---|---|---|---|---|
| TGT | SRC | LEN | SID | TRTP | CC | CM | DATA | CS |
| 3 bytes | Max. 255 bytes | 1 byte | ||||||
TGT and SRC: the ID of the Target (TGT) and Source (SRC) devices of the message. The VU Interface shall have the default ID “EE”. This ID cannot be changed. The ITS Unit shall use the default ID “A0” for its first message of the communication session. The VU Interface shall then assign an unique ID to the ITS Unit and informs it of this ID for future messages during the session.
The LEN byte shall only take into account the ‘DATA’ part of the Data Field (see Table 2), the 4 first bytes are implicit.
The VU Interface shall confirm the authenticity of the message's sender by cross-checking its own IDList with the Bluetooth data by checking the ITS Unit listed at the provided ID is currently in the range of the Bluetooth connection.
Besides the SID, the Data Field shall also contain other parameters: a transfer request parameter (TRTP) and Counter bytes.
[F2If the data to be handled is larger than the available space in one message, it will be split in several submessages. Each submessage shall have the same Header and SID, but will contain a 2-bytes counter, Counter Current (CC) and Counter Max (CM), to indicate the submessage number. To enable error checking and abort the receiving device acknowledges every submessage. The receiving device can accept the submessage, ask for it to be re-transmitted, request the sending device to start again or abort the transmission.]
If not used, CC and CM shall be given the value 0xFF.
For instance, the following message
| HEADER | SID | TRTP | CC | CM | DATA | CS |
|---|---|---|---|---|---|---|
| 3 bytes | Longer than 255 bytes | 1 byte | ||||
Shall be transmitted as such:
| HEADER | SID | TRTP | 01 | n | DATA | CS |
|---|---|---|---|---|---|---|
| 3 bytes | 255 bytes | 1 byte | ||||
| HEADER | SID | TRTP | 02 | n | DATA | CS |
|---|---|---|---|---|---|---|
| 3 bytes | 255 bytes | 1 byte | ||||
…
| HEADER | SID | TRTP | N | N | DATA | CS |
|---|---|---|---|---|---|---|
| 3 bytes | Max. 255 bytes | 1 byte | ||||
Table 3 contains the messages the VU and the ITS Unit shall be able to exchange. The content of each parameter is given in hexadecimal. Aren't represented in the table CC and CM for clarity, see above for complete format.
Detailed message content
| Message | Header | DATA | Checksum | ||||
|---|---|---|---|---|---|---|---|
| TGT | SRC | LEN | SID | TRTP | DATA | ||
| RequestPIN | ITSID | EE | 00 | 01 | FF | ||
| SendITSID | ITSID | EE | 01 | 02 | FF | ITSID | |
| SendPIN | EE | ITSID | 04 | 03 | FF | 4*INTEGER (0..9) | |
| PairingResult | ITSID | EE | 01 | 04 | FF | BOOLEAN (T/F) | |
| SendPUC | EE | ITSID | 08 | 05 | FF | 8*INTEGER (0..9) | |
| BanLiftingResult | ITSID | EE | 01 | 06 | FF | BOOLEAN (T/F) | |
| RequestRejected | ITSID | EE | 08 | 07 | FF | Time | |
| RequestData | |||||||
| standardTachData | EE | ITSID | 01 | 08 | 01 | ||
| personalTachData | EE | ITSID | 01 | 08 | 02 | ||
| gnssData | EE | ITSID | 01 | 08 | 03 | ||
| standardEventData | EE | ITSID | 01 | 08 | 04 | ||
| personalEventData | EE | ITSID | 01 | 08 | 05 | ||
| standardFaultData | EE | ITSID | 01 | 08 | 06 | ||
| manufacturerData | EE | ITSID | 01 | 08 | 07 | ||
| ResquestAccepted | ITSID | EE | Len | 09 | TREP | Data | |
| DataUnavailable | |||||||
| No data available | ITSID | EE | 02 | 0A | TREP | 10 | |
| Personal data not shared | ITSID | EE | 02 | 0A | TREP | 11 | |
| NegativeAnswer | |||||||
| General reject | ITSID | EE | 02 | 0B | SID Req | 10 | |
| Service not supported | ITSID | EE | 02 | 0B | SID Req | 11 | |
| Sub function not supported | ITSID | EE | 02 | 0B | SID Req | 12 | |
| Incorrect message length | ITSID | EE | 02 | 0B | SID Req | 13 | |
| Conditions not correct or request sequence error | ITSID | EE | 02 | 0B | SID Req | 22 | |
| Request out of range | ITSID | EE | 02 | 0B | SID Req | 31 | |
| Response pending | ITSID | EE | 02 | 0B | SID Req | 78 | |
| ITSID Mismatch | ITSID | EE | 02 | 0B | SID Req | FC | |
| ITSID Not Found | ITSID | EE | 02 | 0B | SID Req | FB | |
This message is issued by the VU Interface if a non-blacklisted but non-whitelisted ITS unit is sending any data request.
This message is issued by the VU Interface whenever a new device is sending a request. This device shall use the default ID “A0” before getting assigned an unique ID for the communication session.
This message is issued by the ITS Unit to be whitelisted from the VU interface. The content of this message is a 4 INTEGER between 0 and 9 code.
This message is issued by the VU Interface to inform the ITS Unit if the PIN code it sent was correct. The content of this message shall be a BOOLEAN with the value ‘True’ if the PIN code was correct and ‘False’ otherwise.
This message is issued by the ITS Unit to lift a blacklist sanction from the VU interface. The content of this message is a 8 INTEGER between 0 and 9 code.
This message is issued by the VU Interface to inform the ITS Unit if the PUC code it sent was correct. The content of this message shall be a BOOLEAN with the value ‘True’ if the PUC code was correct and ‘False’ otherwise.
This message is issued by the VU Interface as a reply to any message from a blacklisted ITS Unit except ‘SendPUC’. The message shall contain the remaining time the ITS Unit is blacklisted, following the ‘Time’ sequence format as defined in Annex 3.
This message for data accessing is issued by the ITS Unit. A one byte transfer request parameter (TRTP) indicates the type of data required. There are several types of data:
standardTachData (TRTP 01): Data available from the tachograph classified as non-personal.
personalTachData (TRTP 02): Data available from the tachograph classified as personal.
gnssData (TRTP 03): GNSS data, always personal.
standardEventData (TRTP 04): Recorded event data classified as non-personal.
personalEventData (TRTP 05): Recorded event data classified as personal.
standardFaultData (TRTP 06): Recorded faults classified as non-personal.
manufacturerData (TRTP 07): data made available by the manufacturer.
See Annex 3 of this appendix for more information about the content of each data type.
See Appendix 12 for more information about the format and content of GNSS data.
See Annex IB and IC for more information about event data code and faults.
This message is issued by the VU Interface if a ITS Unit ‘RequestData’ message has been accepted. This message contains a 1-byte TREP, which is the TRTP byte of the associated RequestData message, and all the data of the requested type.
This message is issued by the VU Interface if, for a certain reason, the requested data aren't available to be sent to a whitelisted ITS Unit. The message contains a 1byte TREP which is the TRTP of the required data and a 1 byte error code specified in the table 3. The Following codes are available:
No data available (10): The VU interface can't access the VU data for unspecified reasons.
Personal data not shared (11): The ITS Unit tries to retrieve personal data when they are not shared.
These messages are issued by the VU Interface if a request cannot be completed for any other reason than the unavailability of the data. These messages are typically the result of a bad request format (Length, SID, ITSID…) but aren't limited to that. The TRTP in the Data Field contains the SID of the request. The Data Field contains a code identifying the reason of the negative answer. The following codes are available:
General Reject (code: 10)
The action can't be performed for a reason which isn't cited below nor in section (Enter DataUnavailable section number).
Service not supported (code: 11)
The request's SID isn't understood.
Sub function not supported (code: 12)
The request's TRTP isn't understood. It can be for instance missing or out of accepted values.
Incorrect message length (code: 13)
The length of the received message is wrong (mismatch between the LEN byte and the actual message length).
Conditions not correct or request sequence error (code: 22)
The required service is not active or the sequence of request messages is not correct
Request out of range (code: 33)
The request parameter record (data field) is not valid
Response pending (code: 78)
The action requested cannot be completed in time and the VU is not ready to accept another request.
ITSID Mismatch (code: FB)
The SRC ITSID doesn't match the associated device after comparison with the Bluetooth information.
ITSID Not Found (code: FC)
The SRC ITSID isn't associated with any device.
Lines 1 through 72 (FormatMessageModule) of the ASN.1 code in Annex 3 specify the messages format as described in table 3. More details about the messages content is given below.
All the data available are classified as either standard or personal. Personal data shall only be accessible if the driver gave his/her consent, accepting his/her tachograph personal data can leave the vehicle network for third party applications.
Driver consent is given when, at first insertion of a given driver card or workshop card currently unknown to the vehicle unit, the cardholder is invited to express his consent for tachograph related personal data output through the optional ITS interface. (see also Annex I C paragraph 3.6.2).
The consent status (enabled/disabled) is recorded in the memory of the tachograph.
In case of multiple drivers, only the personal data about the drivers who gave their consent shall be shared with the ITS interface. For instance, if there's two drivers in the vehicle, and only the first driver accepted to share his personal data, the ones concerning the second driver shall not be shared.
Figure 3 of Annex 2 represents the sequence diagrams of a valid request sent by the ITS Unit to access standard data. The ITS Unit is properly whitelisted and isn't requesting personal data, no further verification is required. The diagrams consider the proper procedure illustrated in Figure 2 of Annex 2 has already been followed. They can be equated to the REQUEST TREATMENT gray box of Figure 2.
Amongst available data, shall be considered standard:
standardTachData (TRTP 01)
StandardEventData (TRTP 04)
standardFaultData (TRTP 06)
Figure 4 of Annex 2 represents the sequence diagram for personal data request processing. As previously stated, the VU interface shall only send personal data if the driver has given his explicit consent (see also 4.5). Otherwise, the request must be automatically rejected.
Amongst available data, shall be considered personal:
personalTachData (TRTP 02)
gnssData (TRTP 03)
personalEventData (TRTP 05)
manufacturerData (TRTP 07)
ITS units shall be able to request events data containing the list of all the unexpected events. These data are considered standard or personal, see Annex 3. The content of each event is in accordance with the documentation provided in Annex 1 of this appendix.
| Data | Source | Data classification (personal/not personal) |
|---|---|---|
| VehicleIdentificationNumber | Vehicle Unit | not personal |
| CalibrationDate | Vehicle Unit | not personal |
| TachographVehicleSpeed speed instant t | Vehicle Unit | personal |
| Driver1WorkingState Selector driver | Vehicle Unit | personal |
| Driver2WorkingState | Vehicle Unit | personal |
| DriveRecognize Speed Threshold detected | Vehicle Unit | not personal |
| Driver1TimeRelatedStates Weekly day time | Driver Card | personal |
| Driver2TimeRelatedStates | Driver Card | personal |
| DriverCardDriver1 | Vehicle Unit | not personal |
| DriverCardDriver2 | Vehicle Unit | not personal |
| OverSpeed | Vehicle Unit | personal |
| TimeDate | Vehicle Unit | not personal |
| HighResolutionTotalVehicleDistance | Vehicle Unit | not personal |
| ServiceComponentIdentification | Vehicle Unit | not personal |
| ServiceDelayCalendarTimeBased | Vehicle Unit | not personal |
| Driver1Identification | Driver Card | personal |
| Driver2Identification | Driver Card | personal |
| NextCalibrationDate | Vehicle Unit | not personal |
| Driver1ContinuousDrivingTime | Driver Card | personal |
| Driver2ContinuousDrivingTime | Driver Card | personal |
| Driver1CumulativeBreakTime | Driver Card | personal |
| Driver2CumulativeBreakTime | Driver Card | personal |
| Driver1CurrentDurationOfSelectedActivity | Driver Card | personal |
| Driver2CurrentDurationOfSelectedActivity | Driver Card | personal |
| SpeedAuthorised | Vehicle Unit | not personal |
| TachographCardSlot1 | Driver Card | not personal |
| TachographCardSlot2 | Driver Card | not personal |
| Driver1Name | Driver Card | personal |
| Driver2Name | Driver Card | personal |
| OutOfScopeCondition | Vehicle Unit | not personal |
| ModeOfOperation | Vehicle Unit | not personal |
| Driver1CumulatedDrivingTimePreviousAndCurrentWeek | Driver Card | personal |
| Driver2CumulatedDrivingTimePreviousAndCurrentWeek | Driver Card | personal |
| EngineSpeed | Vehicle Unit | personal |
| RegisteringMemberState | Vehicle Unit | not personal |
| VehicleRegistrationNumber | Vehicle Unit | not personal |
| Driver1EndOfLastDailyRestPeriod | Driver Card | personal |
| Driver2EndOfLastDailyRestPeriod | Driver Card | personal |
| Driver1EndOfLastWeeklyRestPeriod | Driver Card | personal |
| Driver2EndOfLastWeeklyRestPeriod | Driver Card | personal |
| Driver1EndOfSecondLastWeeklyRestPeriod | Driver Card | personal |
| Driver2EndOfSecondLastWeeklyRestPeriod | Driver Card | personal |
| Driver1CurrentDailyDrivingTime | Driver Card | personal |
| Driver2CurrentDailyDrivingTime | Driver Card | personal |
| Driver1CurrentWeeklyDrivingTime | Driver Card | personal |
| Driver2CurrentWeeklyDrivingTime | Driver Card | personal |
| Driver1TimeLeftUntilNewDailyRestPeriod | Driver Card | personal |
| Driver2TimeLeftUntilNewDailyRestPeriod | Driver Card | personal |
| Driver1CardExpiryDate | Driver Card | personal |
| Driver2CardExpiryDate | Driver Card | personal |
| Driver1CardNextMandatoryDownloadDate | Driver Card | personal |
| Driver2CardNextMandatoryDownloadDate | Driver Card | personal |
| TachographNextMandatoryDownloadDate | Vehicle Unit | not personal |
| Driver1TimeLeftUntilNewWeeklyRestPeriod | Driver Card | personal |
| Driver2TimeLeftUntilNewWeeklyRestPeriod | Driver Card | personal |
| Driver1NumberOfTimes9hDailyDrivingTimesExceeded | Driver Card | personal |
| Driver2NumberOfTimes9hDailyDrivingTimesExceeced | Driver Card | personal |
| Driver1CumulativeUninterruptedRestTime | Driver Card | personal |
| Driver2CumulativeUninterruptedRestTime | Driver Card | personal |
| Driver1MinimumDailyRest | Driver Card | personal |
| Driver2MinimumDailyRest | Driver Card | personal |
| Driver1MinimumWeeklyRest | Driver Card | personal |
| Driver2MinimumWeeklyRest | Driver Card | personal |
| Driver1MaximumDailyPeriod | Driver Card | personal |
| Driver2MaximumDailyPeriod | Driver Card | personal |
| Driver1MaximumDailyDrivingTime | Driver Card | personal |
| Driver2MaximumDailyDrivingTime | Driver Card | personal |
| Driver1NumberOfUsedReducedDailyRestPeriods | Driver Card | personal |
| Driver2NumberOfUsedReducedDailyRestPeriods | Driver Card | personal |
| Driver1RemainingCurrentDrivingTime | Driver Card | personal |
| Driver2RemainingCurrentDrivingTime | Driver Card | personal |
| GNSS position | Vehicle Unit | personal |
See Appendix 12 — GNSS.
| Event | Storage rules | Data to be recorded per event |
|---|---|---|
| Insertion of a non-valid card |
|
|
| Card conflict |
|
|
| Last card session not correctly closed |
|
|
| Power supply interruption (2) |
|
|
| Communication error with the remote communication facility |
|
|
| Absence of position information from GNSS receiver |
|
|
| [F12Communication error with the external GNSS facility |
|
|
| Motion data error |
|
|
| Vehicle motion conflict |
|
|
| Security breach attempt | the 10 most recent events per type of event. |
|
| Time conflict |
|
|
| Event | Storage rules | Data to be recorded per event |
|---|---|---|
| Driving without an appropriate card |
|
|
| Card insertion while driving |
|
|
| Over speeding (1) |
|
|
| Fault | Storage rules | Data to be recorded per fault |
|---|---|---|
| Card fault |
|
|
| Recording equipment faults |
|
|
This fault shall be triggered for any of these failures, while not in calibration mode:
VU internal fault
Printer fault
Display fault
Downloading fault
Sensor fault
GNSS receiver or external GNSS facility fault
Remote Communication facility fault
[F12ITS interface fault (if applicable)]
| Event or Fault | Storage rules | Data to be recorded per event |
|---|---|---|
| To be defined by Manufacturer | To be defined by Manufacturer | To be defined by Manufacturer |
Figure 3
Sequence Diagram to process a request for data classified as non-personal (after correct PIN access)
Figure 4
Sequence Diagram to process a request for data classified as personal (after correct PIN access)
This Appendix specifies the design and the procedures to follow in order to perform the remote communication function (the Communication) as required in Article 9 of Regulation (EU) No 165/2014 (the Regulation).
It is important to comprehend that this functionality is intended to serve only as a pre-filter in order to select vehicles for closer inspection, and it does not replace the formal inspection process as determined in the provisions of Regulation (EU) No 165/2014. See recital 9 in the preamble of this regulation, stating that remote communication between the tachograph and control authorities for roadside control purposes facilitates targeted roadside checks.
The scope of this Appendix is to specify how agents of the competent control authorities use a specified 5.8 GHz DSRC wireless communication to remotely obtain data (the Data) from a targeted vehicle that identifies that the targeted vehicle is in potential violation of Regulation (EU) No 165/2014 and should be targeted for consideration to be stopped for further investigation.
Regulation (EU) No 165/2014 requires that the Data collected shall be limited to data or pertaining to data that identifies a potential infringement, as defined in Article 9 of Regulation (EU) No 165/2014.
[F2In this scenario, the time available for communication is limited, because the Communication is targeted and of a short- range design. Further, the same communication means for remote tachograph monitoring (RTM) may also be used by the competent control authorities for other applications (such as the maximal weights and dimensions for heavy goods vehicles defined in Directive (EU) 2015/719) and such operations may be separate or sequential at the discretion of the competent control authorities.]
This Appendix specifies:
The communications equipment, procedures and protocols to be used for the Communication
The Standards and Regulations to which the radio equipment shall comply
The presentation of the Data to the Communication equipment
The enquiry and download procedures and sequence of operations
The Data to be transferred
Potential interpretation of the Data transferred across the Communication
The provisions for security data relating to the Communication
The availability of the Data to the competent control authorities
How the Remote early detection communication reader can request different freight and fleet data concepts
For clarification, this Appendix does not specify:
the collection of the Data operation and management within the VU (which shall be a function of product design unless specified elsewhere within Regulation (EU) No 165/2014)
the form of presentation of collected data to the agent of the competent control authorities, nor the criteria which shall be used by the competent control authorities to decide which vehicles to stop (which shall be a function of product design unless specified elsewhere within Regulation (EU) No 165/2014 or a policy decision of the competent control authorities). For clarification: the Communication only makes the Data available to the competent control authorities in order that they may make informed decisions
Data security provisions (such as encryption) concerning the content of the Data (which shall be specified within Appendix 11 Common Security Mechanisms).
detail of any data concepts other than RTM which may be obtained using the same architecture and equipment
detail of the behaviour and management between VU's and the DSRC-VU, nor the behaviour within the DSRC-VU (other than to provide the Data when so requested by an REDCR).
The following acronyms and definitions specific to this Appendix are used in this appendix:
electrical device which converts electric power into radio waves, and vice versa used in combination with a radio transmitter or radio receiver. In operation, a radio transmitter supplies an electric current oscillating at radio frequency to the antenna's terminals, and the antenna radiates the energy from the current as electromagnetic waves (radio waves). In reception, an antenna intercepts some of the power of an electromagnetic wave in order to produce a tiny voltage at its terminals, that is applied to a receiver to be amplified
exchange of information/data between a DSRC-REDCR and a DSRC-VU according to section 5 in a master-slave relationship to obtain the Data.
secured data of defined format (see 5.4.4) requested by the DSRC-REDCR and provided to the DSRC-REDCR by the DSRC-VU across a 5.8 GHz DSRC link as defined in 5 below
Regulation (EU) No 165/2014 of the European Parliament and of the Council of 4 February 2014 on tachographs in road transport, repealing Council Regulation (EEC) No 3821/85 on recording equipment in road transport and amending Regulation (EC) No 561/2006 of the European Parliament and of the Council on the harmonisation of certain social legislation relating to road transport
Application Identifier
Bluetooth Low Energy
Beacon Service Table
Card insertion while driving
cyclic redundancy check
identifier of a requirement for a specific DSRC appendix
Dedicated Short Range Communication
DSRC — Remote Early Detection Communication Reader.
DSRC — Vehicle Unit. This is the ‘remote early detection facility’ defined in Annex 1C.
Driving without valid card
Element Identifier
Logical Link Control
LLC Protocol Data Unit
Onboard Weighing System
Protocol Data Unit
Remote early detection communication reader. This is the ‘remote early detection communication reader equipment’ defined in Annex 1C.
Remote Tachograph Monitoring
Security Module-Remote early detection communication reader
Telematics Applications for Regulated Vehicles (ISO 15638 series of Standards)
Vehicle Unit
Vehicle Unit Payload Memory
Vehicle Unit Security Module
Vehicle Service Table
Weigh in motion
Weigh on board
The specification defined in this Appendix refers to and depends upon all or parts of the following regulations and standards. Within the clauses of this Appendix the relevant standards, or relevant clauses of standards, are specified. In the event of any contradiction the clauses of this Appendix shall take precedence. In the event of any contradiction where no specification is clearly determined in this Appendix, operating within ERC 70-03 (and tested against the appropriate parameters of EN 300 674-1) shall take precedence, followed in descending order of preference by EN 12795, EN 12253 EN 12834 and EN 13372, 6.2, 6.3, 6.4 and 7.1.
Regulations and standards referenced in this Appendix are:
Regulation (EU) No 165/2014 of the European Parliament and of the Council of 4 February 2014 on tachographs in road transport, repealing Council Regulation (EEC) No 3821/85 on recording equipment in road transport and amending Regulation (EC) No 561/2006 of the European Parliament and of the Council on the harmonisation of certain social legislation relating to road transport.
Regulation (EC) No 561/2006 of the European Parliament and of the Council of 15 March 2006 on the harmonisation of certain social legislation relating to road transport and amending Council Regulations (EEC) No 3821/85 and (EC) No 2135/98 and repealing Council Regulation (EEC) No 3820/85 (Text with EEA relevance).
ERC 70-03 CEPT: ECC Recommendation 70-03: Relating to the Use of Short Range Devices (SRD)
ISO 15638 Intelligent transport systems — Framework for cooperative telematics applications for regulated commercial freight vehicles (TARV).
EN 300 674-1 Electromagnetic compatibility and Radio spectrum Matters (ERM); Road Transport and Traffic Telematics (RTTT); Dedicated Short Range Communication (DSRC) transmission equipment (500 kbit/s / 250 kbit/s) operating in the 5,8 GHz Industrial, Scientific and Medical (ISM) band; Part 1: General characteristics and test methods for Road Side Units (RSU) and On-Board Units (OBU).
EN 12253 Road transport and traffic telematics — Dedicated short-range communication — Physical layer using microwave at 5.8 GHz.
EN 12795 Road transport and traffic telematics — Dedicated short-range communication — Data link layer: medium access and logical link control.
EN 12834 Road transport and traffic telematics — Dedicated short-range communication — Application layer.
EN 13372 Road transport and traffic telematics — Dedicated short-range communication — Profiles for RTTT applications
ISO 14906 Electronic fee collection — Application interface definition for dedicated short- range communication
Regulation (EU) No 165/2014 provides specific and controlled scenarios within which the Communication is to be used.
The scenarios supported are:
‘Communication Profile 1: Roadside inspection using a short range wireless communication Remote Early Detection Communication Reader instigating a physical roadside inspection (master-:-slave)
Reader Profile 1a: via a hand aimed or temporary roadside mounted and aimed Remote Early Detection Communication
Reader Profile 1b: via a vehicle mounted and directed Remote Early Detection Communication Reader’.
NOTE: In order to understand the context of the preconditions the reader is referred to Figure 14.3 below.U.K.
This profile covers the use case where an agent of the competent control authorities, uses a short range remote communication Remote Early Detection Communication Reader (5.8 GHz DSRC interfaces operating within ERC 70-03, and tested against the appropriate parameters of EN 300 674-1 as described in section 5) (the REDCR) to remotely identify a vehicle which is potentially in violation of Regulation (EU) No 165/2014. Once identified, the agent of the competent control authorities who is controlling the interrogation decides whether the vehicle should be stopped.
In this use case the agent of the competent control authorities is situated at the roadside, and aims a hand held, tripod mounted, or similar portable, REDCR from the roadside towards the centre of the windshield of the targeted vehicle. The interrogation is made using 5.8 GHz DSRC interfaces operating within ERC 70-03, and tested against the appropriate parameters of EN 300 674-1 as described in section 5. See Figure 14.1 (Use Case 1).
In this use case the agent of the competent control authorities is situated within a moving vehicle, and either aims a hand held, portable REDCR from the vehicle towards the centre of the windshield of the targeted vehicle, or the REDCR is mounted within or on the vehicle so as to point towards the centre of the windshield of the targeted vehicle when the Remote Early Detection Communication Reader's vehicle is in a particular position relevant to the targeted vehicle (for example directly ahead in a stream of traffic). The interrogation is made using 5.8 GHz DSRC interfaces operating within ERC 70-03, and tested against the appropriate parameters of EN 300 674-1 as described in section 5. See Figure 14.2. (Use Case 2).
To give the possibility to verify the authenticity and integrity of downloaded data through the remote communication, the secured Data is verified and decrypted in accordance with Appendix 11 Common Security Mechanisms.
The design of the remote communication function in the Smart Tachograph is shown as described in Figure 14.3.
Security Module (VUSM). This function present in the VU is responsible for securing the Data which is to be transmitted from the DSRC-VU to the agent of the competent control authorities via remote communication.
The secured data is stored in the VUSM memory. At intervals determined in 4.1.1.1 (DSC_12), the VU encrypts and replenishes the RTMdata concept (which comprises payload data and security data concept values determined below in this Appendix) held in the memory of the DSRC-VU. The operation of the security module is defined in Appendix 11 Common Security Mechanisms and outwith the scope of this Appendix, save that it shall be required to provide updates to the VU Communication facility each time the VUSM data changes.
The communication between the VU and the DSRC-VU may be a wired communication or a Bluetooth Low Energy (BLE) communication, and the physical location of the DSRC-VU may be integral with the antenna on the windshield of the vehicle, may be internal to the VU, or located somewhere between.
The DSRC-VU shall have a reliable source of power available at all times. The means by which it is provided with its power is a design decision.
The memory of the DSRC-VU shall be non-volatile in order to maintain the Data in the DSRC-VU even when the vehicle ignition is switched off.
If the communication between the VU and the DSRC-VU is made via BLE and the power source is a non-recharging battery, the power source of the DSRC-VU shall be replaced at every Periodic Inspection, and the manufacturer of the DSRC-VU equipment shall be responsible to ensure that the power supply is adequate to last from one Periodic Inspection to the next Periodic Inspection, maintaining normal access to the data by an REDCR throughout the period without failure or interruption.
VU RTM ‘payload memory’ facility (VUPM). This function present in the VU is responsible for providing and updating the Data. The content of The Data. (‘TachographPayload’) is defined in 5.4.4/5.4.5 below and is updated at the interval determined in 4.1.1.1 (DSC_12).
DSRC-VU. This is the function, within or connected to the antenna and in communication with the VU through a wired or wireless (BLE) connection, which holds the current data (VUPM-data) and manages the response to an interrogation across the 5.8 GHz DSRC medium. Disconnection of the DSRC facility or interference during normal vehicle operation with the functioning of the DSRC facility shall be construed as a violation of Regulation (EU) No 165/2014.
Security module (REDCR) (SM-REDCR) is the function used to decrypt and check integrity of the data originating from the VU. The means by which this is achieved is determined in Appendix 11 Common Security Mechanisms, and is not defined in this Appendix.
The DSRC facility (REDCR) (DSRC-REDCR) function comprises a 5.8 GHz transceiver and associated firmware and software which manages the Communication with the DSRC-VU according to this Appendix.
The DSRC-REDCR interrogates the DSRC-VU of the targeted vehicle and obtains the Data (the targeted vehicle's current VUPM-data) via the DSRC link and processes and stores the received data in its SM-REDCR.
[F2The DSRC-VU antenna shall be positioned at a location where it optimizes the DSRC communication between the vehicle and the roadside reader antenna, when the reader is installed 15 meters distance in front of the vehicle and 2 meters height, targeting the horizontal and vertical centre of the windscreen. For light vehicles an installation corresponding to the upper part of the windscreen is suitable. For all the other vehicles the DSRC antenna shall be installed either near the lower or near the upper part of the windscreen.]
Figure 14.4
Example of positioning of the 5,8 GHz DSRC antenna in the windshield of regulated vehicles
The form factor of the REDCR and its antenna may vary according to the circumstances of the reader (tripod mounted, hand held, vehicle mounted, etc.) and the modus operandi employed by the agent of the competent control authorities.
A display and/or notification function is used to present the results of the remote communication function to the agent of the competent control authorities. A display may be provided on a screen, as a printed output, an audio signal, or a combination of such notifications. The form of such display and/or notification is a matter of the requirements of the agents of the competent control authorities and equipment design and is not specified within this Appendix.
The workflow of operations is represented in Figure 14.5.
The steps are described below:
Whenever the vehicle is in operation (ignition ON) the tachograph is providing data to the VU function. The VU function prepares the Data for the remote communication function (encrypted) and updates the VUPM held in the memory of the DSRC-VU (as defined in 4.1.1.1 — 4.1.1.2). The Data collected shall be formatted as determined in 5.4.4 — 5.4.5 below.
On every occasion that the Data is updated, the timestamp defined in the security data concept shall be updated.
The VUSM function secures the data in accordance with the procedures determined in Appendix 11.
On every occasion that the Data is updated (see 4.1.1.1 — 4.1.1.2), the Data shall be transferred to the DSRC-VU, where it replaces any previous data, in order that updated current data (the Data) shall always be available to be provided in the event of an interrogation by an REDCR. When supplied by the VU to the DSRC-VU the Data shall be identifiable by the filename RTMData or by ApplicationID and Attribute identifiers.
If an agent of the competent control authorities wishes to target a vehicle and collect the Data from the targeted vehicle, the agent of the competent control authorities shall first insert his/her smartcard in the REDCR to enable the Communication and to allow the SM-REDCR to verify its authenticity and decrypt the data.
The agent of the competent control authority then targets a vehicle and requests the data through remote communication. The REDCR opens a 5.8 GHz DSRC interface session with the DSRC-VU of the targeted vehicle, and requests the Data. The Data is transferred to the REDCR through the wireless communication system as a DSRC Attribute using the Application service GET as defined in 5.4. The Attribute contains the encrypted payload data values and the DSRC security data.
The data is analyzed by the REDCR equipment and provided to the agent of the competent control authority.
The agent of the competent control authority uses the data to assist in a decision of whether or not to stop for a detailed inspection, or ask another agent of the competent control authority to stop the vehicle.
Namely:
Downlink parameters
a – Downlink parameters subject to conformance testing in accordance with relevant parameter test from EN 300 674-1. | |||
| Item No | Parameter | Value(s) | Remark |
|---|---|---|---|
| D1 | Downlink Carrier Frequencies | There are four alternatives which may be used by an REDCR:
| Within ERC 70-03. Carrier Frequencies may be selected by the implementer of the roadside system and need not be known in the DSRC-VU (Consistent with EN 12253, EN 13372) |
| D1aa | Tolerance of Carrier Frequencies | within ± 5 ppm | (Consistent with EN 12253) |
| D2a | RSU (REDCR) Transmitter Spectrum Mask | Within ERC 70-03. REDCR shall be according to Class B,C as defined in EN 12253. No other specific requirement within this Annex | Parameter used for controlling interference between interrogators in proximity (as defined in EN 12253 and EN 13372). |
| D3 | OBU(DSRC-VU) Minimum Frequency Range | 5,795 — 5,815 GHz | (Consistent with EN 12253) |
| D4a | Maximum E.I.R.P. | Within ERC 70-03 (unlicensed) and within National Regulation Maximum + 33 dBm | (Consistent with EN 12253) |
| D4a | Angular E.I.R.P. mask | According to declared and published specification of interrogator designer | (Consistent with EN 12253) |
| D5 | Polarisation | Left hand circular | (Consistent with EN 12253) |
| D5a | Cross-Polarisation | XPD: In bore sight: (REDCR) RSU t ≥ 15 dB (DSRC-VU) OBU r ≥ 10 dB At -3 dB area: (REDCR) RSU t ≥ 10 dB (DSRC-VU) OBU r ≥ 6 dB | (Consistent with EN 12253) |
| D6a | Modulation | Two level amplitude modulation. | (Consistent with EN 12253) |
| D6aa | Modulation Index | 0,5 ... 0,9 | (Consistent with EN 12253) |
| D6b | Eye Pattern | ≥ 90 % (time) / ≥ 85 % (amplitude) | |
| D7a | Data Coding | FM0 ‘1’ bit has transitions only at the beginning and end of the bit interval. ‘0’ bit has an additional transition in the middle of the bit interval compared to the ‘1’ bit. | (Consistent with EN 12253) |
| D8a | Bit rate | 500 kBit/s | (Consistent with EN 12253) |
| D8a | Tolerance of Bit Clock | better than ± 100 ppm | (Consistent with EN 12253) |
| D9a | Bit Error Rate (B.E.R.) for communication | ≤ 10– 6 when incident power at OBU (DSRC-VU) is in the range given by [D11a to D11b]. | (Consistent with EN 12253) |
| D10 | Wake-up trigger for OBU (DSRC-VU) | OBU (DSRC-VU) shall wake up on receiving any frame with 11 or more octets (including preamble) | No special wake-up pattern is necessary. DSRC-VU may wake up on receiving a frame with less than 11 octets (Consistent with EN 12253) |
| D10a | Maximum Start Time | ≤ 5 ms | (Consistent with EN 12253) |
| D11 | Communication zone | Spatial region within which a B.E.R. according to D9a is achieved | (Consistent with EN 12253) |
| D11aa | Power Limit for communication (upper). | – 24dBm | (Consistent with EN 12253) |
| D11ba | Power Limit for communication (lower). | Incident power:
| (Consistent with EN 12253) Extended requirement for horizontal angles up to ±45°, due to the use cases defined in this annex. |
| D12a | Cut-off power level of (DSRC-VU) | – 60 dBm | (Consistent with EN 12253) |
| D13 | Preamble | Preamble is mandatory. | (Consistent with EN 12253) |
| D13a | Preamble Length and Pattern | 16 bits ± 1 bit of FM0 coded ‘1’ bits | (Consistent with EN 12253) |
| D13b | Preamble Wave form | An alternating sequence of low level and high level with pulse duration of 2 μs. The tolerance is given byD8a | (Consistent with EN 12253) |
| D13c | Trailing Bits | The RSU (REDCR) is permitted to transmit a maximum of 8 bits after the end flag. An OBU (DSRC-VU) is not required to take these additional bits into account. | (Consistent with EN 12253) |
Uplink parameters
a – Uplink parameters subject to conformance testing in accordance with relevant parameter test from EN 300 674-1 | |||
| Item No. | Parameter | Value(s) | Remark |
|---|---|---|---|
| U1a | Sub-carrier Frequencies | A OBU (DSRC-VU) shall support 1,5 MHz and 2,0 MHz An RSU (REDCR) shall support 1,5 MHz or 2,0 MHz or both. U1-0: 1,5 MHz U1-1: 2,0 MHz | Selection of sub-carrier frequency (1,5 MHz or 2,0 MHz) depends on the EN 13372 profile selected. |
| U1aa | Tolerance of Sub- carrier Frequencies | within ± 0,1 % | (Consistent with EN 12253) |
| U1b | Use of Side Bands | Same data on both sides | (Consistent with EN 12253) |
| U2a | OBU (DSRC-VU) Transmitter Spectrum Mask | According to EN12253 1) Out band power: see ETSI EN 300674-1 2) In band power: [U4a] dBm in 500 kHz 3) Emission in any other uplink channel: U2(3)-1 = – 35 dBm in 500 kHz | (Consistent with EN 12253) |
| U4aa | Maximum Single Side Band E.I.R.P. (boresight) | Two options:
| According to declared and published specification of equipment designer |
| U4ba | Maximum Single Side Band E.I.R.P. (35°) | Two options:
| According to declared and published specification of equipment designer |
| U5 | Polarisation | Left hand circular | (Consistent with EN 12253) |
| U5a | Cross Polarisation | XPD: In bore sight: (REDCR) RSU r ≥ 15 dB (DSRC-VU) OBU t ≥ 10 dB At – 3 dB: (REDCR) RSU r ≥ 10 dB (DSRC-VU) OBU t ≥ 6 dB | (Consistent with EN 12253) |
| U6 | Sub-Carrier Modulation | 2-PSK Encoded data synchronised with sub-carrier: Transitions of encoded data coincide with transitions of sub- carrier. | (Consistent with EN 12253) |
| U6b | Duty Cycle | Duty Cycle: 50 % ± α, α ≤ 5 % | (Consistent with EN 12253) |
| U6c | Modulation on Carrier | Multiplication of modulated sub- carrier with carrier. | (Consistent with EN 12253) |
| U7a | Data Coding | NRZI (No transition at beginning of ‘1’ bit, transition at beginning of ‘0’ bit, no transition within bit) | (Consistent with EN 12253) |
| U8a | Bit Rate | 250 kbit/s | (Consistent with EN 12253) |
| U8a | Tolerance of Bit Clock | Within ± 1 000 ppm | (Consistent with EN 12253) |
| U9 | Bit Error Rate (B.E.R.) for communication | ≤10– 6 | (Consistent with EN 12253) |
| U11 | Communication Zone | The spatial region within which the DSRC-VU is situated such that its transmissions are received by the REDCR with a B.E.R. of less than that given by U9a. | (Consistent with EN 12253) |
| U12aa | Conversion Gain (lower limit) | 1 dB for each side band Range of angle: Circularly symmetric between bore sight and ± 35° and | |
| within – 45° ± 45° Corresponding to the plane parallel to the road surface when the DSRC-VU later is installed in the vehicle (Azimuth) | Greater that the specified value range for horizontal angles up to ± 45°, due to the use cases defined in this annex. | ||
| U12ba | Conversion Gain (upper limit) | 10 dB for each side band | Less than the specified value range for each side band within a circular cone around boresight of ± 45° opening angle |
| U13 | Preamble | Preamble is mandatory. | (Consistent with EN 12253) |
| U13a | Preamble Length and Pattern | 32 to 36 μs modulated with sub- carrier only, then 8 bits of NRZI coded ‘0’ bits. | (Consistent with EN 12253) |
| U13b | Trailing Bits | The DSRC-VU is permitted to transmit a maximum of 8 bits after the end flag. A RSU (REDCR) is not required to take these additional bits into account. | (Consistent with EN 12253) |
NOTE The purpose of the initialisation phase (Step 1) is to set up the communication between the REDCR and DSRC-VUs that have entered the 5.8 GHz DSRC (master-slave) transaction zone but have not yet established communication with the REDCR, and to notify the application processes.U.K.
Initialisation. The REDCR sends a frame containing a ‘beacon service table’ (BST) that includes the application identifiers (AIDs) in the service list that it supports. In the RTM application this will simply be the service with the AID value = 2 (Freight&Fleet). The DSRC-VU evaluates the received BST, and shall respond (see below) with the list of the supported applications within the Freight&Fleet domain, or shall not respond if none are supported. If the REDCR does not offer AID=2, the DSRC-VU shall not answer to the REDCR.
The DSRC-VU sends a frame containing a request for a private window allocation.
The REDCR sends a frame containing a private window allocation.
The DSRC-VU uses the allocated private window to send a frame containing its vehicle service table (VST). This VST includes a list of all the different application instantiations that this DSRC-VU supports in the framework of AID=2. The different instantiations shall be identified by means of uniquely generated EIDs, each associated with an Application Context Mark parameter value indicating the application and standard supported.
Next the REDCR analyses the offered VST, and either terminates the connection (RELEASE) since it is not interested in anything the VST has to offer (i.e. it is receiving a VST from a DSRC-VU that is not supporting the RTM transaction), or, if it receives an appropriate VST it starts an app instantiation.
To bring this about, the REDCR shall send a frame containing a command to retrieve the RTM data, identifying the RTM application instantiation by specifying the identifier corresponding to the RTM application instantiation (as specified by the DSRC-VU in the VST), and shall allocate a private window.
The DSRC-VU uses the newly allocated private window to send a frame that contains the addressed identifier corresponding to the RTM application instantiation as provided in the VST, followed by the attribute RtmData (payload element + security element).
If there are multiple services requested, the value ‘n’ is changed to the next service reference number and the process repeated.
The REDCR confirms receipt of the data by sending a frame containing a RELEASE command to the DSRC-VU to terminate the session OR if it has failed to validate a successful receipt of the LDPU goes back to step 6.
See Figure 14.6 for a pictorial description of the transaction protocol.
:
A command, issued from the REDCR in the form of a broadcast with definition of applications that the REDCR supports.
:
An answer from the DSRC-VU confirming the connection and containing a list of supported application instances with characteristics and information how to address them (EID).
:
A command, issued from the REDCR to the DSRC-VU, that specifies the application instantiation to be addressed by means of a defined EID, as received in the VST, instructing the DSRC-VU to send the selected attribute(s) with the Data. The objective of the GET command is for the REDCR to obtain the Data from the DSRC-VU.
:
An answer from the DSRC-VU that contains the Data requested.
:
A command, instructing the DSRC-VU to send back data from the DSRC-VU to the REDCR. The objective of the ECHO command is to enable workshops or type approval test facilities to test that the DSRC link is working without needing access to security credentials.
:
An answer from the DSRC VU on the ECHO command.
:
A command, instructing the DSRC-VU that the transaction is ended. The objective of the RELEASE command is to end the session with the DSRC-VU. On receipt of the RELEASE the DSRC-VU shall not respond to any further interrogations under the current connection. Note that according to EN 12834 a DSRC-VU will not connect twice to the same interrogator unless it has been out of the communication zone for 255 seconds or if the Beacon ID of the interrogator is changed.
| Sequence | Sender | Receiver | Description | Action | |
|---|---|---|---|---|---|
| 1 | REDCR | > | DSRC-VU | Initialisation of the communication link — Request | REDCR broadcasts BST |
| 2 | DSRC-VU | > | REDCR | Initialisation of the communication link — Response | If BST supports AID=2 then DSRC-VU Requests a private window |
| 3 | REDCR | > | DSRC-VU | Grants a private window | Sends Frame containing private window allocation |
| 4 | DSRC-VU | > | REDCR | Sends VST | Sends Frame comprising VST |
| 5 | REDCR | > | DSRC-VU | Sends GET.request for data in Attribute for specific EID | |
| 6 | DSRC-VU | > | REDCR | Sends GET.response with requested Attribute for specific EID | Sends Attribute (RTMData, OWSData….) with data for specific EID |
| [F27 | REDCR | > | DSRC-VU | Sends GET.request for data of other Attribute (if appropriate) ] | |
| 8 | DSRC-VU | > | REDCR | Sends GET.response with requested Attribute | Sends Attribute with data for specific EID |
| 9 | REDCR | > | DSRC-VU | Acknowledges successful receipt of data | Sends RELEASE command which closes transaction |
| 10 | DSRC-VU | Closes transaction |
An example of the transaction sequence and contents of the exchanged frames is defined in clauses 5.4.7 and 5.4.8
EncryptedTachographPayload data, which is the encryption of the TachographPayload defined in ASN.1 in section 5.4.5. The method of encryption is described in Appendix 11
DSRCSecurityData, specified in Appendix 11.
The ASN.1 module definition for the DSRC data within the RTM application is defined as follows:
| Table 14.3 | |||
| Elements of RtmData, actions performed and definitions | |||
| (1) RTM Data Element | (2) Action performed by the VU | (3) ASN.1 definition of data | |
|---|---|---|---|
RTM1 Vehicle Registration Plate | The VU shall set the value of the tp15638VehicleRegistrationPlate data element RTM1 from the recorded value of the data type VehicleRegistrationIdentification as defined in Appendix 1 VehicleRegistrationIdentification | Vehicle Registration Plate expressed as a string of characters | |
RTM2 Speeding Event | The VU shall generate a boolean value for data element RTM2 tp15638SpeedingEvent. The tp15638SpeedingEvent value shall be calculated by the VU from the number of Over Speeding Events recorded in the VU in the last 10 days of occurrence, as defined in Annex 1C. If there is at least one tp15638SpeedingEvent in the last 10 days of occurrence, the tp15638SpeedingEvent value shall be set to TRUE. ELSE if there are no events in the last 10 days of occurrence, the tp15638SpeedingEvent shall be set to FALSE. | 1 (TRUE) — Indicates irregularities in speed within last 10 days of occurrence | |
RTM3 Driving Without Valid Card | The VU shall generate a boolean value for data element RTM3 tp15638DrivingWithoutValidCard. The VU shall assign a value of True to the tp15638DrivingWithoutValidCard variable if the VU data has recorded at least one event in the last 10 days of occurrence of type ‘Driving without an appropriate card’ event as defined in Annex 1C. ELSE if there are no events in the last 10 days of occurrence, the tp15638DrivingWithoutValidCard variable shall be set to FALSE. | 1 (TRUE) = Indicates invalid card usage | |
RTM4 Valid Driver Card | The VU shall generate a boolean value for data element RTM4 tp15638DriverCard on the basis of the data stored in the VU and defined in Appendix 1. If no valid driver card is present the VU shall set the variable to TRUE ELSE if a valid driver card is present the VU shall set the variable to FALSE | 0 (FALSE) = Indicates a valid driver card | |
RTM5 Card Insertion while Driving | The VU shall generate a boolean value for data element RTM5. The VU shall assign a value of TRUE to the tp15638CardInsertion variable if the VU data has recorded in the last 10 days of occurrence at least one event of type ‘Card insertion while driving.’ as defined in Annex 1C. ELSE if there are no such events in the last 10 days of occurrence, the tp15638CardInsertion variable shall be set to FALSE. | 1 (TRUE) = Indicates card insertion while driving within last 10 days of occurrence | |
RTM6 Motion Data Error | The VU shall generate a boolean value for data element RTM6. The VU shall assign a value of TRUE to the tp15638MotionDataError variable if the VU data has in the last 10 days of occurrence recorded at least one event of type ‘Motion data error’ as defined in Annex 1C. ELSE if there are no such events in the last 10 days of occurrence, the tp15638MotionDataError variable shall be set to FALSE. | 1 (TRUE) = Indicates motion data error within last 10 days of occurrence | |
RTM7 Vehicle Motion Conflict | The VU shall generate a boolean value for data element RTM7. The VU shall assign a value of TRUE to the tp15638vehicleMotionConflict variable if the VU data has in the last 10 days recorded at least one event of type Vehicle Motion Conflict (value ‘0A’H ). ELSE if there are no events in the last 10 days of occurrence, the tp15638vehicleMotionConflict variable shall be set to FALSE. | 1 (TRUE) = Indicates motion conflict within last 10 days of occurrence | |
RTM8 2nd Driver Card | The VU shall generate a boolean value for data element RTM8 on the basis of Annex 1C (‘Driver Activity Data’ CREW and CO-DRIVER). If a 2nd valid driver card is present the VU shall set the variable to TRUE ELSE if a 2nd valid driver card is not present the VU shall set the variable to FALSE | 1 (TRUE) = Indicates a second driver card inserted | |
RTM9 Current Activity | The VU shall generate a boolean value for data element RTM9. If the current activity is recorded in the VU as any activity other than ‘DRIVING’ as defined in Annex 1C the VU shall set the variable to TRUE ELSE if the current activity is recorded in the VU as ‘DRIVING’ the VU shall set the variable to FALSE | 1 (TRUE) = other activity selected; 0 (FALSE) = driving selected | |
RTM10 Last Session Closed | The VU shall generate a boolean value for data element RTM10. If the last card session was not properly closed as defined in Annex 1C the VU shall set the variable to TRUE. ELSE if the last card session was properly closed the VU shall set the variable to FALSE | 1 (TRUE) = improperly closed 0 (FALSE) = properly closed | |
RTM11 Power Supply Interruption | The VU shall generate an integer value for data element RTM11. The VU shall assign a value for the tp15638PowerSupplyInterruption variable equal to the longest power supply interruption according to Article 9, Reg (EU) 165/2014 of type ‘Power supply interruption’ as defined in Annex 1C. ELSE if in the last 10 days of occurrence there are have been no Power supply interruption events the value of the integer shall be set to 0. | — Number of power supply interruptions in last 10 days of occurrence | |
[F2RTM12 Sensor Fault | The VU shall generate an integer value for data element RTM12. The VU shall assign to the variable sensorFault a value of:
| – sensor fault one octet as per data dictionary ] | |
RTM13 Time Adjustment | The VU shall generate an integer value (timeReal from Appendix 1) for data element RTM13 on the basis of the presence of Time Adjustment data as defined in Annex 1C. The VU shall assign the value of time at which the last time adjustment data event has occurred. ELSE if no ‘Time Adjustment’ event. as defined in Annex 1C is present in the VU data it shall set a value of 0 | Time of the last time adjustment | |
RTM14 Security Breach Attempt | The VU shall generate an integer value (timeReal from Appendix 1) for data element RTM14 on the basis of the presence of a Security breach attempt event as defined in Annex 1C. The VU shall set the value of the time of the latest security breach attempt event recorded by the VU. ELSE if no ‘security breach attempt’ event as defined in Annex 1C is present in the VU data it shall set a value of 0x00FF. | Time of last breach attempt — Default value =0x00FF | |
RTM15 Last Calibration | The VU shall generate an integer value (timeReal from Appendix 1) for data element RTM15 on the basis of the presence of Last Calibration data as defined in Annex 1C. The VU shall set the value of time of the latest two calibrations (RTM15 and RTM16), which are set in VuCalibrationData defined in Appendix 1. The VU shall set the value for RTM15 to the timeReal of the latest calibration record. | Time of last calibration data | |
RTM16 Previous Calibration | The VU shall generate an integer value (timeReal from Appendix 1) for data element RTM16 of the calibration record preceding that of the last calibration ELSE if there has been no previous calibration the VU shall set the value of RTM16 to 0. | Time of previous calibration data | |
RTM17 Date Tachograph Connected | For data element RTM17 the VU shall generate an integer value (timeReal from Appendix 1). The VU shall set the value of the time of the initial installation of the VU. The VU shall extract this data from the VuCalibrationData (Appendix 1) from the vuCalibrationRecords with CalibrationPurpose equal to: ‘03’H | Date tachograph connected | |
RTM18 Current Speed | The VU shall generate an integer value for data element RTM18. The VU shall set the value for RTM16 to the last current recorded speed at the time of the latest update of the RtmData. | Last current recorded speed | |
RTM19 Timestamp | For data element RTM19 the VU shall generate an integer value (timeReal from Appendix 1). The VU shall set the value for RTM19 to the time of the latest update of the RtmData. | Timestamp of current TachographPayload record | |
| Table 14.4 | |
| Initialisation — BST frame settings | |
| Field | Settings |
|---|---|
| Link Identifier | Broadcast address |
| BeaconId | As per EN 12834 |
| Time | As per EN 12834 |
| Profile | No extension, 0 or 1 to be used |
| MandApplications | No extension, EID not present, Parameter not present, AID= 2 Freight&Fleet |
| NonMandApplications | Not present |
| ProfileList | No extension, number of profiles in list = 0 |
| Fragmentation header | No fragmentation |
| Layer 2 settings | Command PDU, UI command |
A practical example of the settings specified in Table 14.4, with an indication of bit encodings, is given in the following Table 14.5.
Table 14.7 provides an example of bit encoding.
| Table 14.8 | |
| Initialisation — VST frame settings | |
| Field | Settings |
|---|---|
| Private LID | As per EN 12834 |
| VST parameters | Fill=0, then for each supported application: EID present, parameter present, AID=2, EID as generated by the OBU |
| Parameter | No extension, Contains the RTM Context Mark |
| ObeConfiguration | The optional ObeStatus field may be present, but shall not be used by the REDCR |
| Fragmentation header | No fragmentation |
| Layer 2 settings | Command PDU, UI command |
A practical example of the settings specified in Table 14.8, with an indication of bit encodings, is given in Table 14.9.
| Table 14.9 | |||
| Initialisation — VST frame contents example | |||
| Octet # | Attribute/Field | Bits in octet | Description |
|---|---|---|---|
| 1 | FLAG | Start flag | |
| 2 | Private LID | Link address of the specific DSRC-VU | |
| 3 | |||
| 4 | |||
| 5 | |||
| 6 | MAC Control field | Command PDU | |
| 7 | LLC Control field | UI command | |
| 8 | Fragmentation header | No fragmentation | |
| 9 | VST SEQUENCE { | Initialisation response | |
Fill BIT STRING (SIZE(4)) | Unused and set to 0 | ||
| 10 | Profile INTEGER (0..127,...) Applications SEQUENCE OF { | No extension. Example profile 0 | |
| 11 | No extension, 1 application | ||
| 12 | SEQUENCE { | ||
| OPTION indicator | EID present | ||
| OPTION indicator | Parameter present | ||
AID DSRCApplicationEntityID | No extension. AID= 2 Freight&Fleet | ||
| 13 | EID Dsrc-EID | Defined within the OBU and identifying the application instance. | |
| 14 | Parameter Container { | No extension, Container Choice = 02, Octet string | |
| 15 | No extension, Rtm Context Mark length = 8 | ||
| 16 | Rtm-ContextMark::= SEQUENCE { StandardIdentifier standardIdentifier | [F2Object Identifier of the supported standard, part, and version. Example: ISO (1) Standard (0) TARV (15638) part9 (9) Version1 (1). First octet is 06H, which is the Object Identifier. Second octet is 06H, which is its length. Subsequent 6 octets encode the example Object Identifier.] | |
| 17 | |||
| 18 | |||
| 19 | |||
| 20 | |||
| 21 | |||
| 22 | |||
| 23 | |||
| 24 | ObeConfiguration Sequence { | ||
| OPTION indicator | ObeStatus not present | ||
EquipmentClass INTEGER (0..32767) | |||
| 25 | |||
| 26 | ManufacturerId INTEGER (0..65535) | Manufacturer identifier for the DSRC-VU as described in ISO 14816 Register | |
| 27 | |||
| 28 | FCS | Frame check sequence | |
| 29 | |||
| 30 | Flag | End Flag | |
| Table 14.10 | |
| Presentation — GET request frame settings | |
| Field | Settings |
|---|---|
| Invoker Identifier (IID) | Not present |
| Link Identifier (LID) | Link address of the specific DSRC-VU |
| Chaining | No |
| Element Identifier (EID) | As specified in the VST. No extension |
| Access Credentials | No |
| AttributeIdList | No extension, 1 attribute, AttributeID = 1 (RtmData) |
| Fragmentation | No |
| Layer2 settings | Command PDU, Polled ACn command |
Table 14.11 shows an example of reading the RTM data.
| Table 14.12 | |
| Presentation — GET response frame settings | |
| Field | Settings |
|---|---|
| Invoker Identifier (IID) | Not present |
| Link Identifier (LID) | As per EN 12834 |
| Chaining | No |
| Element Identifier (EID) | As specified in the VST. |
| Access Credentials | No |
| Fragmentation | No |
| Layer2 settings | Response PDU, Response available and command accepted, ACn command |
Table 14.13 shows an example of reading the RTM data.
However, the basic DSRC communication can be tested by the command ECHO. Such tests may be required on commissioning, at periodic inspection, or otherwise to the requirement of the competent control authority or Regulation (EU) No 165/2014 (See 6 below)
The REDCR sends a ‘beacon service table’ (BST) that includes the application identifiers (AIDs) in the service list that it supports. In the RTM applications this will simply be the service with the AID value = 2.
The DSRC-VU evaluates the received BST, and where it identifies that the BST is requesting Freight&Fleet (AID = 2), the DSRC-VU shall respond. If the REDCR does not offer AID=2, the DSRC-VU shall shut down its transaction with the REDCR.
The DSRC-VU sends a request for a private window allocation.
The REDCR sends a private window allocation.
The DSRC-VU uses the allocated private window to send its vehicle service table (VST). This VST includes a list of all the different application instantiations that this DSRC-VU supports in the framework of AID=2. The different instantiations shall be identified by means of uniquely EIDs, each associated with a parameter value indicating the instance of the application that is supported.
Next the REDCR analyses the offered VST, and either terminates the connection (RELEASE) since it is not interested in anything the VST has to offer (i.e., it is receiving a VST from a DSRC-VU that is not an RTM VU, or, if it receives an appropriate VST it starts an app instantiation.
The REDCR shall issue a command (ECHO) to the specific DSRC-VU, and allocates a private window.
The DSRC-VU uses the newly allocated private window to send an ECHO response frame.
The following tables give a practical example of an ECHO exchange session.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Textual Amendments
using fixed cable of at least 2 meters, using a Straight DIN 41612 H11 Connector — 11 pin approved male connector from the DSRC-VU to match a similar DIN/ISO approved female connector from the VU device,
using Bluetooth Low Energy (BLE)
using a standard ISO 11898 or SAE J1939 connection
Initialisation of the communication link — Request
Initialisation of the communication link — Response
Send Data with Identifier of the RTM application and Payload defined by RTM Data
Acknowledgment of the data
Termination of the communication link — Request
Termination of the communication link — Response
is used to initialize the communication link. The command is sent by the VU to the DSRC-VU. The LinkIdentifier is set by the VU and communicated to the DSRC-VU to track a specific communication link.
(Note: this is to support future links and other application/modules like Weighing on board).U.K.
is used by the DSRC-VU to provide the response of the request to initialize the communication link. The command is sent by the DSRC-VU to the VU. The command provides the result of the initialisation as answer = 1 (Success) or =0 (Failure).
is used to by the VU to send the signed RCDTData (i.e., the remote communication Data) to the DSRC-VU. The data will be sent every 60 seconds. The DataTransactionId parameter identifies the specific transmission of data. The LinkIdentifier is also used to ensure that the appropriate link is correct.
is sent by the DSRC-VU to provide the feedback to the VU on the reception of the data from a
command identified by the DataTransactionId parameter. The Answer parameter is 1 (Success) or =0 (Failure). If a VU receives more than three answers equal to 0 or if the VU does not receive a RCDT Data Acknowledgment for a specific previously sent RCDT- Send Data with a specific DataTransactionId, the VU will generate and record an event.
is sent by the VU to DSRC-VU to terminate a link for a specific LinkIdentifier.
is sent by the DSRC-VU to the VU to confirm the request of termination of the link by the VU for the specific LinkIdentifier.
The DSRC medium is a dynamic wireless communication in an environment of uncertain atmospheric and interference conditions, particularly in the ‘portable REDCR’ and ‘moving vehicle’ combinations involved in this application. It is therefore necessary to ascertain the difference between a ‘read failure’ and an ‘error’ condition. In a transaction across a wireless interface, read failure is common and the consequence is usually to retry, i.e. rebroadcast the BST and reattempt the sequence, which will in most circumstances lead to a successful communication connection and transfer of data, unless the target vehicle moves out of range during the time required to retransmit. (A ‘successful’ instance of a ‘read’ may have involved several attempts and retries).
Read failure may be because the antennas were not paired properly (failure of ‘aiming’); because one of the antennas is shielded — this may be deliberate, but also can be caused by the physical presence of another vehicle; radio interference, especially from circa 5.8 GHz WIFI or other public access wireless communications, or may be caused by radar interference, or difficult atmospheric conditions (e.g. during a thunderstorm); or simply by moving out of the range of the DSRC communication. Individual instances of read failures, by their nature, cannot be recorded, simply because the communication simply did not occur.
However, if the agent of the competent control authority targets a vehicle and attempts to interrogate its DSRC-VU, but no successful transfer of data ensues, this failure could have occurred because of deliberate tampering, and therefore the agent of the competent control authority needs a means to log the failure, and alert colleagues downstream that there may be a violation. The colleagues can then stop the vehicle and carry out a physical inspection. However, as no successful communication has taken place, the DSRC-VU cannot provide data concerning the failure. Such reporting shall therefore be a function of REDCR equipment design.
‘Failure to read’ is technically different to an ‘error’. In this context an ‘error’ is the acquisition of a wrong value.
Data transferred to the DSRC-VU is supplied already secured, therefore must be verified by the supplier of the data (see 5.4).
Data subsequently transferred across the air interface is checked by cyclic redundancy checks at the communications level. If the CRC validates, then the data is correct. If the CRC does not validate, the data is retransmitted. The probability that data could successfully pass through a CRC incorrectly is statistically so highly improbable that it may be discounted.
If the CRC does not validate and there is no time to retransmit and receive the correct data, then the result will not be an error, but an instantiation of a specific type of read failure.
The only meaningful ‘failure’ data that can be recorded is that of the number of successful initiations of transactions that occur, that do not result in a successful transfer of data to the REDCR.
The only meaningful ‘error’ data that can be recorded is the number of occasions where the REDCR fails to decrypt the Data received. However, it should be noted that this will only relate to the efficiency of the REDCR software. Data may be technically decrypted, but make no semantic sense.
An ECHO test to validate the DSRC-REDCR >>-:-<DSRC-VU wireless communication channel.
A End-to-end security test to ensure that a workshop card is able to access the encrypted and signed data content created by the VU and transmitted over the wireless communication channel.
This clause contains provisions specifically made to test only that the DSRC-REDCR >>-:-<DSRC-VU is functionally active.
The objective of the ECHO command is to enable workshops or type approval test facilities to test that the DSRC link is working without needing access to security credentials. The tester's equipment therefore only needs to be able to initialise a DSRC communication (sending a BST with AID=2) and then send the ECHO command, and, assuming the DSRC is working, will receive the ECHO response. See 5.4.8 for details. Assuming it receives this response correctly, the DSRC link (DSRC-REDCR >>-:-<DSRC-VU) may be validated as functioning correctly.
For the purposes of this Appendix, the following definitions are used.
as defined by this Annex (chapter 1: definition bbb);
as defined by this Regulation (article 2: definition 1);
as defined by this Regulation (article 2: definition 7);
as defined by this Annex (chapter 1: definition ccc);
equipment used to perform data downloading, as defined in Appendix 7 of this Annex.
The preamble of this Annex provides an overview of the transition between the first and the second generation tachograph systems.
In addition to the provisions of this preamble:
first generation motion sensors will not be interoperable with second generation vehicle units.
second generation motion sensors will start to be installed in vehicles at the same time as second generation vehicle units.
data download and calibration equipment will need to evolve, in order to support use of both generation of recording equipment and tachograph cards.
[F2It is understood that first generation tachograph cards are interoperable with first generation vehicle units in compliance with Annex IB to Regulation (EEC) No 3821/85, while second generation tachograph cards are interoperable with second generation vehicle units in compliance with Annex IC to this Regulation. In addition, the requirements below shall apply.]
It is understood that first generation motion sensors are interoperable with first generation vehicle units, while second generation motion sensors are interoperable with second generation vehicle units. In addition, the requirements below shall apply.
[F2non signed EFs IC and ICC (optional),]
[F2the other application data EFs (within DF Tachograph) requested by the first generation card download protocol. This information shall be secured with a digital signature, according to the first generation security mechanisms.
Such download shall not include application data EFs only present in second generation driver (and workshop) cards (application data EFs within DF Tachograph_G2).]
To Be Defined
Vehicle Unit
ISO16844-3 Road vehicles — Tachograph systems — Part 3: Motion sensor interface
The adaptor is only intended for those vehicles that are required to be equipped with recording equipment in compliance with this Regulation.
It shall be installed and used only in those types of vehicle defined in definition yy) ‘adaptor’ of Annex IC where it is not mechanically possible to install any other type of existing motion sensor which is otherwise compliant with the provisions of this Annex and its Appendixes 1 to 16.
The adaptor shall not be mechanically interfaced to a moving part of the vehicle, but connected to the speed/distance impulses which are generated by integrated sensors or alternative interfaces.
interfacing and adapting the incoming speed pulses,
inducing the incoming pulses to the embedded motion sensor,
all functions of the embedded motion sensor, providing secured motion data to the VU.
The requirements in the following Chapters indicate how the requirements of this Annex shall be understood when an adaptor is used. The related requirement numbers of Annex IC are provided between brackets.
the ‘power supply interruption’ event shall be triggered by the VU, while not in calibration mode, in case of any interruption exceeding 200 milliseconds of the power supply of the embedded motion sensor [79]
the ‘motion data error’ event shall be triggered by the VU in case of interruption of the normal data flow between the embedded motion sensor and the VU and/or in case of data integrity or data authentication error during data exchange between the embedded motion sensor and the VU [83]
the ‘security breach attempt’ event shall be triggered by the VU for any other event affecting the security of the embedded motion sensor, while not in calibration mode [85]
the ‘recording equipment’ fault shall be triggered by the VU, while not in calibration mode, for any fault of the embedded motion sensor [88]
react to a magnetic field disturbing vehicle motion detection. In such circumstances, the vehicle unit will record and store a sensor fault [88] or,
have a sensing element that is protected from, or immune to, magnetic fields [217].
name and address of the manufacturer of the adaptor,
manufacturer's part number and year of manufacture of the adaptor,
approval mark of the adaptor type or of the recording equipment type including the adaptor,
the date on which the adaptor has been installed,
the vehicle identification number of the vehicle on which it has been installed.
name of the manufacturer of the embedded motion sensor,
manufacturer's part number and year of manufacture of the embedded motion sensor,
approval mark for the embedded motion sensor.
the adaptor housing shall be sealed (see ADA_017),
the housing of the embedded sensor shall be sealed to the adaptor housing, unless it is not possible to remove the sensor from the adaptor housing without breaking the seal(s) of the adaptor housing (see ADA_018),
the adaptor housing shall be sealed to the vehicle,
the connection between the adaptor and the equipment which provides its incoming pulses shall be sealed on both ends (to the extent of what is reasonably possible).
that the adaptor carries the appropriate type approval markings,
that the seals on the adaptor and its connections are intact,
that the adaptor is installed as indicated on the installation plaque,
that the adaptor is installed as specified by the adapter and/or vehicle manufacturer,
that mounting an adaptor is authorised for the inspected vehicle.
| No | Test | Description | Related requirements |
|---|---|---|---|
| 1. | Administrative examination | ||
| 1.1 | Documentation | Correctness of documentation of the adaptor | |
| 2. | Visual inspection | ||
| 2.1. | Compliance of the adaptor with documentation | ||
| 2.2. | Identification / markings of the adaptor | ADA_027, ADA_028 | |
| 2.3 | Materials of the adaptor | [219] to [223] ADA_026 | |
| 2.4. | Sealing | ADA_017, ADA_018, ADA_034 | |
| 3. | Functional tests | ||
| 3.1 | Inducing the speed pulses to the embedded motion sensor | ADA_013 | |
| 3.2 | Interfacing and adapting incoming speed pulses | ADA_011, ADA_012 | |
| 3.3 | Motion measurement accuracy | [30] to [35], [217] | |
| 4. | Environmental tests | ||
| 4.1 | Manufacturer test results | Results of manufacturer environment tests. | ADA_020, ADA_021, ADA_022, ADA_024 |
| 5. | EMC | ||
| 5.1 | radiated emissions and susceptibility | Verify compliance with Directive 2006/28/EC | ADA_024 |
| 5.2 | Manufacturer test results | Results of manufacturer environment tests. | ADA_024 |
Editorial Information
X1 Inserted by Corrigendum to Commission Implementing Regulation (EU) 2016/799 of 18 March 2016 implementing Regulation (EU) No 165/2014 of the European Parliament and of the Council laying down the requirements for the construction, testing, installation, operation and repair of tachographs and their components (Official Journal of the European Union L 139 of 26 May 2016).
a rectangle, within which shall be placed the letter ‘ e ’ followed by a distinguishing number or letter for the country which has issued the approval in accordance with the following conventional signs:
| Belgium | 6, |
| Bulgaria | 34, |
| Czech Republic | 8, |
| Denmark | 18, |
| Germany | 1, |
| Estonia | 29, |
| Ireland | 24, |
| Greece | 23, |
| Spain | 9, |
| France | 2, |
| Croatia | 25, |
| Italy | 3, |
| Cyprus | CY, |
| Latvia | 32, |
| Lithuania | 36, |
| Luxembourg | 13, |
| Hungary | 7, |
| Malta | MT, |
| Netherlands | 4, |
| Austria | 12, |
| Poland | 20, |
| Portugal | 21, |
| Romania | 19, |
| Slovenia | 26, |
| Slovakia | 27, |
| Finland | 17, |
| Sweden | 5, |
| United Kingdom | 11, |
and
[F2an approval number corresponding to the number of the approval certificate drawn up for the prototype of the recording equipment or the record sheet or the tachograph card, placed at any point within the immediate proximity of that rectangle.]
A Member State which has granted approval shall issue the applicant with an approval certificate, the model of which is given below. When informing other Member States of approvals issued or, if the occasion should arise, withdrawn, a Member State shall use copies of that certificate.
Name of competent administration …
Notification concerning (25) :
approval of a type of recording equipment
withdrawal of approval of a type of recording equipment
approval of a model record sheet
withdrawal of approval of a model record sheet
Approval No:
….
Trade mark or name …
Name of type or model …
Name of manufacturer …
Address of manufacturer …
Submitted for approval on …
Tested at …
Date and number of the test(s) …
Date of approval …
Date of withdrawal of approval …
Type or types of recording equipment in which sheet is designed to be used
Place …
Date …
Descriptive documents annexed …
Remarks (including the position of seals if applicable)
(Signature)
A Member State which has granted approval shall issue the applicant with an approval certificate, the model of which is given below. When informing other Member States of approvals issued or, if the occasion should arise, withdrawn, a Member State shall use copies of that certificate.
Name of competent administration …
Notification concerning (26) :
recording equipment model
recording equipment component (27)
a driver's card
a workshop card
a company card
a controller's card
Approval No:
….
Manufacturing brand or trademark …
Name of model …
Name of manufacturer …
Address of manufacturer …
[F2Submitted for approval on …]
Laboratory(-ies) …
Date and number of test report …
Date of approval …
Date of withdrawal of approval …
Model of recording equipment(s) with which the component is designed to be used
Place …
Date …
Descriptive documents annexed …
Remarks (including the position of seals if applicable)
(Signature)
A Member State which has granted approval shall issue the applicant with an approval certificate, the model of which is given below. When informing other Member States of approvals issued or, if the occasion should arise, withdrawn, a Member State shall use copies of that certificate.
Name of competent administration …
Notification concerning (28) :
recording equipment model
recording equipment component (29)
a driver's card
a workshop card
a company card
a controller's card
Approval No:
….
Manufacturing brand or trademark …
Name of model …
Name of manufacturer …
Address of manufacturer …
[F2Submitted for approval on …]
Test laboratory for functional certification …
Test laboratory for security certification …
Test laboratory for interoperability certification …
Date and number of functional certificate …
Date and number of security certificate …
Date and number of interoperability certificate …
Date of approval …
Date of withdrawal of approval …
Model of recording equipment(s) with which the component is designed to be used
Place …
Date …
Descriptive documents annexed …
Remarks (including the position of seals if applicable)
(Signature)]
Council Directive 96/53/EC of 25 July 1996 laying down for certain road vehicles circulating within the Community the maximum authorized dimensions in national and international traffic and the maximum authorized weights in international traffic (OJ L 235, 17.9.1996, p.59)
Dedicated Short Range Communications standards of the European Standardisation Committee (CEN) EN 12253, EN 12795, EN 12834, EN 13372 and ISO 14906.
Regulation (EU) No 1285/2013 of the European Parliament and of the Council of 11 December 2013 on the implementation and exploitation of European satellite navigation systems and repealing Council Regulation (EC) No 876/2002 and Regulation (EC) No 683/2008 of the European Parliament and of the Council (OJ L 347, 20.12.2013, p. 1).
Commission Regulation (EC) No 68/2009 of 23 January 2009 adapting for the ninth time to technical progress Council Regulation (EEC) No 3821/85 on recording equipment in road transport (OJ L 21, 24.1.2009, p.3).
This way of computing the continuous driving time and the cumulative break time serves in the recording equipment for computing the continuous driving time warning. It does not prejudge the legal interpretation to be made of these times. Alternative ways of computing the continuous driving time and the cumulative break time may be used to replace these definitions if they have been made obsolete by updates in other relevant legislation.
UNKNOWN periods correspond to periods where the driver card was not inserted in the recording equipment and for which no manual entry of driver activities was made.
Regulation (EC) No 561/2006 of the European Parliament and of the Council of 15 March 2006 on the harmonisation of certain social legislation relating to road transport and amending Council Regulations (EEC) No 3821/85 and (EC) No 2135/98 and repealing Council Regulation (EEC) No 3820/85 (OJ L 102, 11.4.2006, p. 1).
Commission Regulation (EU) No 1230/2012 of 12 December 2012 implementing Regulation (EC) No 661/2009 of the European Parliament and of the Council with regard to type-approval requirements for masses and dimensions of motor vehicles and their trailers and amending Directive 2007/46/EC of the European Parliament and of the Council (OJ L 353, 21.12.2012, p. 31) as last amended.
Council Directive 92/6/EEC of 10 February 1992 on the installation and use of speed limitation devices for certain categories of motor vehicles in the Community (OJ L 57, 2.3.1992, p. 27).
Council Directive 92/23/EEC of 31 March 1992 relating to tyres for motor vehicles and their trailers and to their fitting (OJ L 129, 14.5.1992, p. 95).
Council Directive 76/114/EEC of 18 December 1975 on the approximation of the laws of the Member States relating to statutory plates and inscriptions for motor vehicles and their trailers, and their location and method of attachment (OJ L 24, 30.1.1976, p. 1).
[F2Directive 2007/46/EC of the European Parliament and of the Council of 5 September 2007 establishing a framework for the approval of motor vehicles and their trailers, and of systems, components and separate technical units intended for such vehicles (Framework Directive) ( OJ L 263, 9.10.2007, p. 1 ).]
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (OJ L 281, 23.11.1995, p. 31).
Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) (OJ L 201, 31.7.2002, p. 37).
Regulation (EU) No 165/2014 of the European Parliament and of the Council of 4 February 2014 on tachographs in road transport, repealing Council Regulation (EEC) No 3821/85 on recording equipment in road transport and amending Regulation (EC) No 561/2006 of the European Parliament and of the Council on the harmonisation of certain social legislation relating to road transport (OJ L 60, 28.2.2014, p. 1).
Commission Regulation (EC) No 68/2009 of 23 January 2009 adapting for the ninth time to technical progress Council Regulation (EEC) No 3821/85 on recording equipment in road transport (OJ L 21, 24.1.2009, p. 3).
The card inserted will trigger the appropriate access rights to the downloading function and to the data. It shall, however, be possible to download data from a driver card inserted into one of the VU slots when no other card type is inserted in the other slot.
Note that the generation-1, generation-2 and generation-3 pairing keys may actually be the same key, or may be three different keys having different lengths, as explained in CSM_117.
Regulation (EU) No 1285/2013 of the European Parliament and of the Council of 11 December 2013 on the implementation and exploitation of European satellite navigation systems and repealing Council Regulation (EC) No 876/2002 and Regulation (EC) No 683/2008 of the European Parliament and of the Council (OJ L 347, 20.12.2013, p. 1).
[X1These figures are shown for guidance only.]
[X1Delete items not applicable.]
[X1Tick the relevant boxes.]
[X1Specify the component dealt with in the notification.]
[X1Tick the relevant boxes.]
[X1Specify the component dealt with in the notification.]
Editorial Information
X1 Inserted by Corrigendum to Commission Implementing Regulation (EU) 2016/799 of 18 March 2016 implementing Regulation (EU) No 165/2014 of the European Parliament and of the Council laying down the requirements for the construction, testing, installation, operation and repair of tachographs and their components (Official Journal of the European Union L 139 of 26 May 2016).
Textual Amendments
The Whole Regulation you have selected contains over 200 provisions and might take some time to download. You may also experience some issues with your browser, such as an alert box that a script is taking a long time to run.
Would you like to continue?
The Schedules you have selected contains over 200 provisions and might take some time to download. You may also experience some issues with your browser, such as an alert box that a script is taking a long time to run.
Would you like to continue?
Latest Available (revised):The latest available updated version of the legislation incorporating changes made by subsequent legislation and applied by our editorial team. Changes we have not yet applied to the text, can be found in the ‘Changes to Legislation’ area.
Original (As adopted by EU): The original version of the legislation as it stood when it was first adopted in the EU. No changes have been applied to the text.
Geographical Extent: Indicates the geographical area that this provision applies to. For further information see ‘Frequently Asked Questions’.
Show Timeline of Changes: See how this legislation has or could change over time. Turning this feature on will show extra navigation options to go to these specific points in time. Return to the latest available version by using the controls above in the What Version box.
Access essential accompanying documents and information for this legislation item from this tab. Dependent on the legislation item being viewed this may include:
This timeline shows the different versions taken from EUR-Lex before exit day and during the implementation period as well as any subsequent versions created after the implementation period as a result of changes made by UK legislation.
The dates for the EU versions are taken from the document dates on EUR-Lex and may not always coincide with when the changes came into force for the document.
For any versions created after the implementation period as a result of changes made by UK legislation the date will coincide with the earliest date on which the change (e.g an insertion, a repeal or a substitution) that was applied came into force. For further information see our guide to revised legislation on Understanding Legislation.
Use this menu to access essential accompanying documents and information for this legislation item. Dependent on the legislation item being viewed this may include:
Click 'View More' or select 'More Resources' tab for additional information including: