- Latest available (Revised)
- Original (As adopted by EU)
Commission Implementing Regulation (EU) 2018/502 of 28 February 2018 amending Implementing Regulation (EU) 2016/799 laying down the requirements for the construction, testing, installation, operation and repair of tachographs and their components (Text with EEA relevance)
When the UK left the EU, legislation.gov.uk published EU legislation that had been published by the EU up to IP completion day (31 December 2020 11.00 p.m.). On legislation.gov.uk, these items of legislation are kept up-to-date with any amendments made by the UK since then.
Legislation.gov.uk publishes the UK version. EUR-Lex publishes the EU version. The EU Exit Web Archive holds a snapshot of EUR-Lex’s version from IP completion day (31 December 2020 11.00 p.m.).
This version of this Regulation was derived from EUR-Lex on IP completion day (31 December 2020 11:00 p.m.). It has not been amended by the UK since then. Find out more about legislation originating from the EU as published on legislation.gov.uk.![]()
Revised legislation carried on this site may not be fully up to date. At the current time any known changes or effects made by subsequent legislation have been applied to the text of the legislation you are viewing by the editorial team. Please see ‘Frequently Asked Questions’ for details regarding the timescales for which new effects are identified and recorded on this site.
THE EUROPEAN COMMISSION,
Having regard to the Treaty on the Functioning of the European Union,
Having regard to Regulation (EU) No 165/2014 of the European Parliament and of the Council of 4 February 2014 on tachographs in road transport(1), and in particular Articles 11 and 12(7) thereof,
Whereas:
(1) Regulation (EU) No 165/2014 has introduced smart tachographs, second-generation digital tachographs which include a connection to the global navigation satellite system (‘GNSS’) facility, a remote early detection communication facility, and an optional interface with intelligent transport systems.
(2) The technical requirements for the construction, testing, installation, operation and repair of tachographs and their components are set out in Commission Implementing Regulation (EU) 2016/799(2).
(3) In accordance with Articles 8, 9 and 10 of Regulation (EU) No 165/2014, tachographs installed in vehicles registered for the first time on or after 15 June 2019 shall be smart tachographs. Implementing Regulation (EU) 2016/799 must therefore be amended so that the technical provisions laid down therein apply from that date.
(4) In order to comply with Article 8 of Regulation (EU) No 165/2014, which establishes that the position of the vehicle must be recorded every 3 hours of accumulated driving time, Implementing Regulation (EU) 2016/799 should be amended to enable information on the position of the vehicle to be stored with a 3-hour frequency, using a metric that cannot be reset, and to avoid confusion with ‘continuous driving time’, which is a metric with a different function.
(5) The vehicle unit may be a single unit or several units distributed in the vehicle. The GNSS and the Dedicated Short Range Communication (‘DSRC’) facilities could therefore be internal or external to the vehicle unit main body. When they are external, it should be possible that both facilities and the main body of the vehicle unit can be type-approved as components, in order to adapt the smart tachograph type-approval process to the needs of the market.
(6) The rules on the storage of time conflict events and time adjustments must be modified, in order to distinguish between the automatic time adjustments that are triggered following a possible tampering attempt or malfunctioning of the tachograph, and the time adjustments that are due to other reasons such as maintenance.
(7) The data identifiers should be able to distinguish between data downloaded from a smart tachograph and data downloaded from a tachograph of a previous generation.
(8) The validity period of the company card must be extended from 2 to 5 years, in order to align it with the validity period of the driver card.
(9) The description of certain faults and events, the validation of the entries of places where daily work period begins and/or end, the use of the driver consent for Intelligent Transport System (‘ITS’) interface regarding data transmitted by the vehicle unit through the vehicle network and other technical issues should be better defined.
(10) In order to ensure that the certification of tachograph seals is up to date, they need to be adjusted to the new standard on the security of the mechanical seals used on tachographs.
(11) This Regulation concerns the construction, testing, installation and operation of systems which are also comprised of radio equipment regulated by Directive 2014/53/EU of the European Parliament and of the Council(3). This Directive regulates the placement on the market and putting into service of electronic and electrical equipment using radio waves for communication and/or radiodetermination at a horizontal level, with particular respect to electrical safety, compatibility with other systems, access to radio spectrum, access to emergency services and/or any additional delegated provisions. In order to guarantee the efficient use of radio spectrum, to prevent harmful radio interferences, to ensure the safety and the electromagnetic compatibility of the radio equipment and to allow any other specific delegated requirements, this Regulation should be without prejudice to that Directive.
(12) Implementing Regulation (EU) 2016/799 should therefore be amended.
(13) The measures provided for in this Regulation are in accordance with the opinion of the Committee referred to in Article 42(3) of Regulation (EU) No 165/2014,
HAS ADOPTED THIS REGULATION:
Implementing Regulation (EU) 2016/799 is amended as follows:
Article 1 is amended as follows:
the second and third paragraphs are replaced by the following:
‘2.The construction, testing, installation, inspection, operation and repair of smart tachographs and their components, shall comply with the technical requirements set out in Annex IC to this Regulation.
3.Tachographs other than smart tachographs shall continue, as regards construction, testing, installation, inspection, operation and repair, to comply with the requirements of either Annex I to Regulation (EU) No 165/2014 or Annex IB to Council Regulation (EEC) No 3821/85(4), as applicable;’;
the following paragraph 5 is added:
‘5.This Regulation shall be without prejudice to Directive 2014/53/EU of the European Parliament and of the Council(5).’;
Article 2 is amended as follows:
definition (3) is replaced by the following:
“information folder” means the complete folder, in electronic or paper form, containing all the information supplied by the manufacturer or its agent to the type-approval authority for the purpose of the type-approval of a tachograph or a component thereof, including the certificates referred to in Article 12(3) of Regulation (EU) No 165/2014, the performance of the tests defined in Annex IC to this Regulation, as well as drawings, photographs, and other relevant documents;’;
definition (7) is replaced by the following:
“smart tachograph” or “second generation tachograph” means a digital tachograph complying with Articles 8, 9 and 10 of Regulation (EU) No 165/2014 as well as with Annex IC to this Regulation;’;
definition (8) is replaced by the following:
“tachograph component” means any of the following elements: the vehicle unit, the motion sensor, the record sheet, the external GNSS facility and the external remote early detection facility;’;
the following definition (10) is added:
“vehicle unit” means the tachograph excluding the motion sensor and the cables connecting the motion sensor.
It may be a single unit or several units distributed in the vehicle and includes a processing unit, a data memory, a time measurement function, two smart card interface devices for driver and co-driver, a printer, a display, connectors and facilities for entering the user’s inputs, a GNSS receiver and a remote communication facility.
The vehicle unit may be composed of the following components subject to type-approval:
vehicle unit, as a single component (including GNSS receiver and remote communication facility),
vehicle unit main body (including remote communication facility), and external GNSS facility,
vehicle unit main body (including GNSS receiver), and external remote communication facility,
vehicle unit main body, external GNSS facility, and external remote communication facility.
If the vehicle unit is composed of several units distributed in the vehicle, the vehicle unit main body is the unit containing the processing unit, the data memory, and the time measurement function.
“vehicle unit (VU)” is used for “vehicle unit” or “vehicle unit main body” ’;
in Article 6, the third paragraph is replaced by the following:
‘However, Annex IC shall apply from 15 June 2019 with the exception of Appendix 16 which shall apply from 2 March 2016.’;
Annex IC is amended in accordance with Annex I to this Regulation;
Annex II is amended in accordance with Annex II to this Regulation.
This Regulation shall enter into force on the twentieth day following that of its publication in the Official Journal of the European Union.
This Regulation shall be binding in its entirety and directly applicable in all Member States.
Done at Brussels, 28 February 2018.
For the Commission
The President
Jean-Claude Juncker
Annex IC to Regulation (EU) 2016/799 is amended as follows:
the Table of Contents is amended as follows:
point 3.12.5 is replaced by the following:
point 4.5.3.2.16 is replaced by the following:
point 1 is amended as follows:
definition (ll) is replaced by the following:
“remote communication facility” or “remote early detection facility” means:
the equipment of the vehicle unit which is used to perform targeted roadside checks;’;
definition (tt) is replaced by the following:
“time adjustment” means:
an adjustment of current time; this adjustment can be automatic at regular intervals, using the time provided by the GNSS receiver as a reference, or performed in calibration mode;’;
the first dash of definition (yy) is replaced by the following:
‘installed and used only in M1 and N1 type vehicles (as defined in Annex II to Directive 2007/46/EC of the European Parliament and of the Council (*), as last amended),’;
a new definition (fff) is added:
“accumulated driving time” means:
a value representing the total accumulated number of minutes of driving of a particular vehicle.
The accumulated driving time value is a free running count of all minutes regarded as DRIVING by the monitoring of driving activities function of the recording equipment, and is only used for triggering the recording of the vehicle position, every time a multiple of three hours of accumulated driving is reached. The accumulation is started at the recording equipment activation. It is not affected by any other condition, like out of scope or ferry/train crossing.
The accumulated driving time value is not intended to be displayed, printed, or downloaded;’;
in point 2.3, the last indent of paragraph (13) is replaced by the following:
‘the vehicle units have a normal operations validity period of 15 years, starting with the vehicle unit certificates effective date, but vehicle units can be used for additional 3 months, for data downloading only.’;
in point 2.4, the first paragraph is replaced by the following:
‘The system security aims at protecting the data memory in such a way as to prevent unauthorised access to and manipulation of the data and detecting any such attempts, protecting the integrity and authenticity of data exchanged between the motion sensor and the vehicle unit, protecting the integrity and authenticity of data exchanged between the recording equipment and the tachograph cards, protecting the integrity and authenticity of data exchanged between the vehicle unit and the external GNSS facility, if any, protecting the confidentiality, integrity and authenticity of data exchanged through the remote early detection communication for control purposes, and verifying the integrity and authenticity of data downloaded.’;
in point 3.2, the second dash of paragraph (27) is replaced by the following:
‘positions where the accumulated driving time reaches a multiple of three hours;’;
in point 3.4, paragraph (49) is replaced by the following:
in point 3.6.1, paragraph (59) is replaced by the following:
Under the following conditions temporary entry made at last card withdrawal is validated (i.e. shall not be overwritten anymore):
entry of a place where the current daily work period begins during manual entry according to requirement (61);
the next entry of a place where the current daily work period begins if the card holder doesn’t enter any place where the work period begins or ended during the manual entry according to requirement (61).
Under the following conditions temporary entry made at last card withdrawal is overwritten and the new value is validated:
the next entry of a place where the current daily work period ends if the card holder doesn’t enter any place where the work period begins or ended during the manual input according to requirement (61)’;
in point 3.6.2, the sixth and seventh dashes are replaced by the following:
‘a place where a previous daily work period ended, associated to the relevant time (thus overwriting and validating the entry made at the last card withdrawal),
a place where the current daily work period begins, associated to the relevant time (thus validating a temporary entry made at last card withdrawal).’;
point 3.9.15 is replaced by the following:
in point 3.9.17, the following dash is added:
‘ITS interface fault (if applicable)’;
point 3.10 is amended as follows:
the text before the table in paragraph (89) is replaced by the following:
‘The recording equipment shall detect faults through self-tests and built-in-tests, according to the following table:’;
The following row is added to the table:
| ‘ITS interface (optional) | Proper operation’ |
the second dash of point 3.12 is replaced by the following:
‘the average number of positions per day is defined as at least 6 positions where the daily work period begins, 6 positions when the accumulated driving time reaches a multiple of three hours, and 6 positions where the daily work period ends, so that “365 days” include at least 6570 positions,’;
point 3.12.5 is amended as follows:
the heading and paragraph (108) are replaced by the following:
places and positions where the driver and/or co-driver begins his daily work period;
positions where the accumulated driving time reaches a multiple of three hours;
places and positions where the driver and/or the co-driver ends his daily work period.’;
the fourth dash of paragraph (110) is replaced by the following:
‘The type of entry (begin, end or 3 hours accumulated driving time),’;
in point 3.12.7, paragraph (116) is replaced by the following:
the table in point 3.12.8 is amended as follows:
the following item is inserted between the items ‘Absence of position information from GNSS receiver’ and ‘Motion data error’:
| ‘Communication error with the external GNSS facility |
|
|
The item ‘Time conflict’ is replaced by the following:
| ‘Time conflict |
|
|
in point 3.20 paragraph (200) is replaced by the following:
In Appendix 13, an optional ITS interface is specified and standardized. Other vehicle unit interfaces may co-exist, provided they fully comply with the requirements of Appendix 13 in term of minimum list of data, security and driver consent.
The driver consent doesn’t apply to data transmitted by the recording equipment to the vehicle network. In case the personal data injected in the vehicle network are further processed outside the vehicle network, it is the responsibility of the vehicle manufacturer to have that personal data process compliant with Regulation (EU) 2016/679 (“General Data Protection Regulation”).
The driver consent doesn’t apply either to tachograph data downloaded to a remote company (requirement 193), as this scenario is monitored by the company card access right.
The following requirements apply to ITS data made available through that interface:
these data are a set of selected existing data from the tachograph data dictionary (Appendix 1),
a subset of these selected data are marked “personal data”,
the subset of “personal data” is only available if the verifiable consent of the driver, accepting his personal data can leave the vehicle network, is enabled,
At any moment, the driver consent can be enabled or disabled through commands in the menu, provided the driver card is inserted,
the set and subset of data will be broadcasted via Bluetooth wireless protocol in the radius of the vehicle cab, with a refresh rate of 1 minute,
the pairing of the external device with the ITS interface will be protected by a dedicated and random PIN of at least 4 digits, recorded in and available through the display of each vehicle unit,
in any circumstances, the presence of the ITS interface cannot disturb or affect the correct functioning and the security of the vehicle unit.
Other data may also be output in addition to the set of selected existing data, considered as the minimum list, provided they cannot be considered as personal data.
The recording equipment shall have the capacity to communicate the driver consent status to other platforms in the vehicle network.
When the ignition of the vehicle is ON, these data shall be permanently broadcasted.’;
in point 3.23, paragraph (211) is replaced by the following:
in point 3.26, paragraphs (225) and (226) are replaced by the following:
name and address of the manufacturer,
manufacturer's part number and year of manufacture,
serial number,
type-approval mark.
in point 4.1, the drawing corresponding to the front and reverse of the driver card is replaced by the following:
‘
’
in point 4.5.3.1.8, the first dash in paragraph (263) is replaced by the following:
‘Card fault (where this card is the subject of the fault),’;
in point 4.5.3.2.8, the first dash in paragraph (288) is replaced by the following:
‘Card fault (where this card is the subject of the fault),’;
point 4.5.3.2.16 is replaced by the following:
the date and time when the accumulated driving time reaches a multiple of three hours,
the position of the vehicle,
the GNSS accuracy, date and time when the position was determined,
the vehicle odometer value.
point 4.5.4.2.14 is replaced by the following:
the date and time when the accumulated driving time reaches a multiple of three hours,
the position of the vehicle,
the GNSS accuracy, date and time when the position was determined,
the vehicle odometer value.
in point 5.2, paragraph (396) is replaced by the following:
name, address or trade name of the approved fitter or workshop,
characteristic coefficient of the vehicle, in the form “w = … imp/km”,
constant of the recording equipment, in the form “k = … imp/km”,
effective circumference of the wheel tyres in the form “l = … mm”,
tyre size,
the date on which the characteristic coefficient of the vehicle and the effective circumference of the wheel tyres were measured,
the vehicle identification number,
the presence (or not) of an external GNSS facility,
the serial number of the external GNSS facility, if applicable,
the serial number of the remote communication device, if any,
the serial number of all the seals in place,
the part of the vehicle where the adaptor, if any, is installed,
the part of the vehicle where the motion sensor is installed, if not connected to the gear-box or an adaptor is not being used,
a description of the colour of the cable between the adaptor and that part of the vehicle providing its incoming impulses,
the serial number of the embedded motion sensor of the adaptor.’;
point 5.3 is amended as follows:
a new paragraph (398a) is inserted after paragraph (398):
in paragraph (401), the second sub-paragraph is replaced by the following:
‘This unique identification number is defined as: MMNNNNNNNN by non-removable marking, with MM as unique manufacturer identification (database registration to be managed by EC) and NNNNNNNN seal alpha-numeric number, unique in the manufacturer domain.’;
paragraph (403) is replaced by the following:
point 6.2 is replaced by the following:
in point 6.3, paragraph (408) is replaced by the following:
point 8.1 is amended as follows
in point 8.1, the introduction text before paragraph (425) is replaced by the following:
‘For the purpose of this chapter, the words “recording equipment” mean “recording equipment or its components”. No type approval is required for the cable(s) linking the motion sensor to the VU, the external GNSS facility to the VU or the external remote communication facility to the VU. The paper, for use by the recording equipment, shall be considered as a component of the recording equipment.
Any manufacturer may ask for type approval of recording equipment component(s) with any other recording equipment component(s), provided each component complies with the requirements of this annex. Alternately, manufacturers may also ask for type approval of recording equipment.
As described in definition (10) in Article 2 of this Regulation, vehicle units have variants in components assembly. Whatever the vehicle unit components assembly, the external antenna and (if applicable) the antenna splitter connected to the GNSS receiver or to the remote communication facility are not part of the vehicle unit type approval.
Nevertheless, manufacturers having obtained type approval for recording equipment shall maintain a publicly available list of compatible antennas and splitters with each type approved vehicle unit, external GNSS facility and external remote communication facility.’;
paragraph (427) is replaced by the following:
a security certificate (if requested by this Annex),
a functional certificate,
and an interoperability certificate (if requested by this Annex)
for the recording equipment or the tachograph card, subject of the request for type approval.’;
Appendix 1 is amended as follows:
the Table of Content is amended as follows:
in point 2, the following text is added before point 2.1:
‘For card data types used for Generation 1 and Generation 2 applications, the size specified in this Appendix is the one for Generation 2 application. The size for Generation 1 application is supposed to be already known by the reader. The Annex IC requirement numbers related to such data types cover both Generation 1 and Generation 2 applications.’;
point 2.19 is replaced by the following:
Generation 1:
Information, stored in a driver or workshop card, related to the events associated with the card holder (Annex IC requirements 260 and 318).
CardEventData is a sequence, ordered by ascending value of EventFaultType, of cardEventRecords (except security breach attempts related records which are gathered in the last set of the sequence).
cardEventRecords is a set of event records of a given event type (or category for security breach attempts events).
Generation 2:
Information, stored in a driver or workshop card, related to the events associated with the card holder (Annex IC requirements 285 and 341).
CardEventData is a sequence, ordered by ascending value of EventFaultType, of cardEventRecords (except security breach attempts related records which are gathered in the last set of the sequence).
cardEventRecords is a set of event records of a given event type (or category for security breach attempts events).’
point 2.30 is replaced by the following:
A card renewal index (definition i)).
Value assignment: (see this Annex chapter 7).
First issue.
Order for increase: “0, …, 9, A, …, Z” ’;
in point 2.61, the text after the heading Generation 2 is replaced by the following:
‘
In addition to generation 1 the following data elements are used:
noOfGNSSADRecords is the number of GNSS accumulated driving records the card can store.
noOfSpecificConditionRecords is the number of specific condition records the card can store.
noOfCardVehicleUnitRecords is the number of vehicle units used records the card can store.’;
in point 2.67, the text under the heading ‘Generation 2’ is replaced by the following:
‘The same values as in generation 1 are used with the following additions:
in point 2.70, the text under the heading ‘Generation 2’ is replaced by the following:
‘Generation 2:
Point 2.71 is replaced by the following:
Generation 2:
The extended seal identifier uniquely identifies a seal (Annex IC requirement 401).
manufacturerCode is a code of the manufacturer of the seal.
sealIdentifier is an identifier for the seal which is unique for the manufacturer.’;
points 2.78 and 2.79 are replaced by the following:
Generation 2:
Information, stored in a driver or workshop card, related to the GNSS position of the vehicle if the accumulated driving time reaches a multiple of three hours (Annex IC requirement 306 and 354).
gnssADPointerNewestRecord is the index of the last updated GNSS accumulated driving record.
Value assignment is the number corresponding to the numerator of the GNSS accumulated driving record, beginning with '0' for the first occurrence of the GNSS accumulated driving record in the structure.
gnssAccumulatedDrivingRecords is the set of records containing the date and time the accumulated driving reaches a multiple of three hours and information on the position of the vehicle.
Generation 2:
Information, stored in a driver or workshop card, related to the GNSS position of the vehicle if the accumulated driving time reaches a multiple of three hours (Annex IC requirement 305 and 353)
timeStamp is the date and time when the accumulated driving time reaches a multiple of three hours.
gnssPlaceRecord contains information related to the position of the vehicle.
vehicleOdometerValue is the odometer value when the accumulated driving time reaches a multiple of three hours.’;
point 2.86 is replaced by the following:
A unique identifier of a Public Key used to reference and select the key. It also identifies the holder of the key.
The first choice is suitable to reference the public key of a Vehicle Unit, of a tachograph card or of an external GNSS facility.
The second choice is suitable to reference the public key of a Vehicle Unit (in cases where the serial number of the Vehicle Unit cannot be known at certificate generation time).
The third choice is suitable to reference the public key of a Member State.’;
point 2.92 is replaced by the following:
Generation 2:
A cryptographic check sum of 8, 12 or 16 bytes length corresponding to the cipher suites specified in Appendix 11.
’
point 2.111 is replaced by the following:
Generation 2:
Number of GNSS accumulated driving records a card can store.
Value assignment: see Appendix 2.’;
point 2.162 is replaced by the following:
Code for a combined date and time field, where the date and time are expressed as seconds past 00h.00m.00s. on 1 January 1970 UTC.
Value assignment – Octet aligned: Number of seconds since midnight 1 January 1970 UTC.
The max. possible date/time is in the year 2106.’;
point 2.179 is replaced by the following:
Generation 2:
Information, stored in a vehicle unit, about a tachograph card used (Annex IC requirement 132).
cardNumberAndGenerationInformation is the full card number and generation of the card used (data type 2.74).
cardExtendedSerialNumber as read from the file EF_ICC under the MF of the card.
cardStructureVersion as read from the file EF_Application_Identification under the DF_Tachograph_G2.
cardNumber as read from the file EF_Identification under the DF_Tachograph_G2.’;
points 2.203 and 2.204 are replaced by the following:
Generation 2:
Information, stored in a vehicle unit, related to the GNSS position of the vehicle if the accumulated driving time reaches a multiple of three hours (Annex IC requirement 108, 110).
timeStamp is the date and time when the accumulated driving time reaches a multiple of three hours.
cardNumberAndGenDriverSlot identifies the card including its generation which is inserted in the driver slot.
cardNumberAndGenCodriverSlot identifies the card including its generation which is inserted in the co-driver slot.
gnssPlaceRecord contains information related to the position of the vehicle.
vehicleOdometerValue is the odometer value when the accumulated driving time reaches a multiple of three hours.
Generation 2:
Information, stored in a vehicle unit, related to the GNSS position of the vehicle if the accumulated driving time reaches a multiple of three hours (Annex IC requirement 108 and 110).
recordType denotes the type of the record (VuGNSSADRecord).
Value Assignment: See RecordType.
recordSize is the size of the VuGNSSADRecord in bytes.
noOfRecords is the number of records in the set records.
records is a set of GNSS accumulated driving records.’;
points 2.230 and 2.231 are replaced by the following:
in point 2.234, the text under the heading ‘Generation 2’ is replaced by the following:
‘
In addition to generation 1 the following data elements are used:
noOfGNSSADRecords is the number of GNSS accumulated driving records the card can store.
noOfSpecificConditionRecords is the number of specific condition records the card can store.
noOfCardVehicleUnitRecords is the number of vehicle units used records the card can store’;
Appendix 2 is amended as follows:
in point 1.1, the following abbreviations are added:
Certificate Holder Authorisation
Data Object’;
point 3.3 is amended as follows:
paragraph TCS_24 is replaced by the following:
:
All security conditions must be fulfilled
:
At least one security condition must be fulfilled
The access rules for the file system, i.e. the SELECT, READ BINARY and UPDATE BINARY command, are specified in chapter 4. The access rules for the remaining commands are specified in the following tables. The term ‘not applicable’ is used if there is no requirement to support the command. In this case the command may or may not be supported, but the access condition is out of scope.’;
in paragraph TCS_25, the table is replaced by the following:
in paragraph TCS_26, the table is replaced by the following:
in paragraph TCS_27, the table is replaced by the following:
in point 3.4, paragraph TCS_29 is replaced by the following:
Additional status words as defined in ISO/IEC 7816-4 can be returned, if their behaviour is not explicitly mentioned in this appendix.
For example the following status words can be optionally returned:
6881: Logical channel not supported
6882: Secure messaging not supported’;
in point 3.5.1.1, the last indent in paragraph TCS_38 is replaced by the following:
‘If the selected application is considered to be corrupted (integrity error is detected within the file attributes), the processing state returned is “6400” or “6500”.’;
in point 3.5.1.2, the last indent in paragraph TCS_41 is replaced by the following:
‘If the selected file is considered to be corrupted (integrity error is detected within the file attributes), the processing state returned is “6400” or “6500”.’;
in point 3.5.2.1, the sixth indent in paragraph TCS_43 is replaced by the following:
‘If an integrity error is detected within the file attributes, the card shall consider the file as corrupted and unrecoverable, the processing state returned is “6400” or “6500”.’;
point 3.5.2.1.1 is amended as follows:
in paragraph TCS_45, the table is replaced by the following:
| ‘Byte | Length | Value | Description |
|---|---|---|---|
| #1 | 1 | “81h” | TPV: Tag for plain value data |
| #2 | L | “NNh” or “81 NNh” | LPV: length of returned data (=original Le). L is 2 bytes if LPV>127 bytes. |
| #(2+L) - #(1+L+NN) | NN | “XX..XXh” | Plain Data value |
| #(2+L+NN) | 1 | “99h” | Tag for Processing Status (SW1-SW2) – optional for generation 1 secure messaging |
| #(3+L+NN) | 1 | “02h” | Length of Processing Status – optional for generation 1 secure messaging |
| #(4+L+NN) - #(5+L+NN) | 2 | “XX XXh” | Processing Status of the unprotected response APDU – optional for generation 1 secure messaging |
| #(6+L+NN) | 1 | “8Eh” | TCC: Tag for cryptographic checksum |
| #(7+L+NN) | 1 | “XXh” | LCC: Length of following cryptographic checksum
|
| #(8+L+NN)-#(7+M+L+NN) | M | “XX..XXh” | Cryptographic checksum |
| SW | 2 | “XXXXh” | Status Words (SW1,SW2)’ |
in paragraph TCS_46, the table is replaced by the following:
| ‘Byte | Length | Value | Description |
|---|---|---|---|
| #1 | 1 | “87h” | TPI CG: Tag for encrypted data (cryptogram) |
| #2 | L | “MMh” or “81 MMh” | LPI CG: length of returned encrypted data (different of original Le of the command due to padding). L is 2 bytes if LPI CG > 127 bytes. |
| #(2+L)-#(1+L+MM) | MM | “01XX..XXh” | Encrypted Data: Padding Indicator and cryptogram |
| #(2+L+MM) | 1 | “99h” | Tag for Processing Status (SW1-SW2) – optional for generation 1 secure messaging |
| #(3+L+MM) | 1 | “02h” | Length of Processing Status – optional for generation 1 secure messaging |
| #(4+L+MM) - #(5+L+MM) | 2 | “XX XXh” | Processing Status of the unprotected response APDU – optional for generation 1 secure messaging |
| #(6+L+MM) | 1 | “8Eh” | TCC: Tag for cryptographic checksum |
| #(7+L+MM) | 1 | “XXh” | LCC: Length of following cryptographic checksum
|
| #(8+L+MM)-#(7+N+L+MM) | N | “XX..XXh” | Cryptographic checksum |
| SW | 2 | “XXXXh” | Status Words (SW1,SW2)’ |
in point 3.5.2.2, the sixth indent in paragraph TCS_50 is replaced by the following:
‘If an integrity error is detected within the file attributes, the card shall consider the file as corrupted and unrecoverable, the processing state returned is “6400” or “6500”.’;
in point 3.5.2.3, paragraph TCS_52 is amended as follows:
the last row of the table is replaced by the following:
| ‘Le | 1 | 'XXh' | As specified in ISO/IEC 7816-4’ |
the following sentence is added:
‘In case of T = 0 the card assumes the value Le = “00h” if no secure messaging is applied.
In case of T = 1 the processing state returned is “6700” if Le=“01h”.’;
in point 3.5.2.3, the sixth indent in paragraph TCS_53 is replaced by the following:
‘If an integrity error is detected within the file attributes, the card shall consider the file as corrupted and unrecoverable, the processing state returned is “6400” or “6500”.’;
in point 3.5.3.2, the sixth indent in paragraph TCS_63 is replaced by the following:
‘If an integrity error is detected within the file attributes, the card shall consider the file as corrupted and unrecoverable, the processing state returned is “6400” or “6500”.’;
in point 3.5.5, paragraph TCS_72 is replaced by the following:
in point 3.5.8, paragraph TCS_95 is replaced by the following:
in point 3.5.9, paragraph TCS_97 is replaced by the following:
in point 3.5.10, the following row is added to the table in paragraph TCS_101:
| ‘5 + L + 1 | 1 | “00h” | As specified in ISO/IEC 7816-4’ |
in point 3.5.11.2.3, the following paragraphs are added in paragraph TCS_114:
‘If the currentAuthenticatedTime of the card is later than the Expiration Date of the selected public key, the processing state returned is “6A88”.
Similarly, in case an MSE: SET DST command referencing an EQT (i.e. a VU or a card) is sent to a control card, according to CSM_234 the referenced key is always an EQT_Sign key that has to be used for the verification of a digital signature. According to Figure 13 in Appendix 11, the control card will always have stored the relevant EQT_Sign public key. In some cases, the control card may have stored the corresponding EQT_MA public key. The control card shall always set the EQT_Sign public key for use when it receives an MSE: SET DST command.’;
point 3.5.13 is amended as follows:
paragraph TCS_121 is replaced by the following:
paragraph TCS_123 is replaced by the following:
the table in paragraph TCS_124 is replaced by the following:
| ‘Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | “80h” | CLA |
| INS | 1 | “2Ah” | Perform Security Operation |
| P1 | 1 | “90h” | Tag: Hash |
| P2 | 1 | “00h” | Algorithm implicitly known For the Tachograph Generation 1 application: SHA-1 For the Tachograph Generation 2 application: SHA-2 algorithm (SHA-256, SHA-384 or SHA-512) defined by the cipher suite in Appendix 11 Part B for the card signature key Card_Sign’ |
point 3.5.14 is amended as follows:
the text below the heading and until paragraph TCS_126 is replaced by the following:
'This command is used to compute the digital signature of previously computed hash code (see PERFORM HASH of FILE, §3.5.13).
Only the driver card and the workshop card are required to support this command in the DF Tachograph and DF Tachograph_G2.
Other types of tachograph cards may or may not implement this command. In case of the Generation 2 tachograph application, only the driver card and the workshop card have a generation 2 signature key, other cards are not able to successfully perform the command and terminate with a suitable error code.
The command may or may not be accessible in the MF. If the command is not accessible in the MF, it shall terminate with a suitable error code.
This command is compliant with ISO/IEC 7816-8. The use of this command is restricted regarding the related standard.';
point 3.5.15 is amended as follows:
the table in paragraph TCS_133 is replaced by the following:
| ‘Byte | Length | Value | Description |
|---|---|---|---|
| CLA | 1 | “00h” | CLA |
| INS | 1 | “2Ah” | Perform Security Operation |
| P1 | 1 | “00h” | |
| P2 | 1 | “A8h” | Tag: data field contains DOs relevant for verification |
| Lc | 1 | “XXh” | Length Lc of the subsequent data field |
| #6 | 1 | “9Eh” | Tag for Digital Signature |
| #7 or #7-#8 | L | “NNh” or “81 NNh” | Length of digital signature (L is 2 bytes if the digital signature is longer than 127 bytes):
|
| #(7+L)-#(6+L+NN) | NN | “XX..XXh” | Digital signature content’ |
the following indent is added to paragraph TCS_134:
‘If the selected public key (used to verify the digital signature) has a CHA.LSB (CertificateHolderAuthorisation.equipmentType) that is not suitable for the digital signature verification according to Appendix 11, the processing state returned is “6985”.’;
point 3.5.16 is amended as follows:
in paragraph TCS_138, the following row is added to the table:
| ‘5 + L + 1 | 1 | '00h' | As specified in ISO/IEC 7816-4’ |
the following sub-paragraph is added to paragraph TCS_139:
‘“6985” indicates that the 4-byte time stamp provided in the command data field is earlier than cardValidityBegin or later than cardExpiryDate.’;
point 4.2.2 is amended as follows:
in point 4.3.1, the text corresponding to the abbreviation SC4 in paragraph TCS_156 is replaced by the following:
(SM-C-MAC-G1 AND SM-R-ENC-MAC-G1) OR
(SM-C-MAC-G2 AND SM-R-ENC-MAC-G2)
For the READ BINARY command with odd INS byte (if supported): NEV’;
in Appendix 3, point 2 is amended as follows:
the following line is inserted after the line with the pictograms ‘Location start of daily work period’ and ‘Location end of daily work period’:
‘
Appendix 4 is amended as follows:
point 2 is amended as follows:
block number 11.4 is replaced by the following:
| ‘11.4 | Entry of place where a daily work period begins and/or ends | |
| pi=location begin / end pictogram, time, country, region longitude of the recorded position latitude of the recorded position timestamp when position was determined Odometer | pihh:mm Cou Reg lon ±DDDoMM.M’ lat ± DDoMM.M’ hh:mm x xxx xxx km’ | |
in point 3.1, position 11.5 of the daily printout format is replaced by the following:
| ‘11.5 | Positions after 3 hours accumulated driving time in chronological order’ |
in point 3.2, the daily printout format is replaced by the following:
| ‘1 | Date and time at which the document is printed | ||
| 2 | Type of printout | ||
| 3 | Card holder identification (for all cards inserted in VU + GEN) | ||
| 4 | Vehicle identification (vehicle from which printout is taken) | ||
| 5 | VU identification (VU from which printout is taken + GEN) | ||
| 6 | Last calibration of this VU | ||
| 7 | Last control on this tachograph | ||
| 9 | Driver activities delimiter | ||
| 10 | Driver slot delimiter (slot 1) | ||
| 10a | Out of scope condition in the beginning of this day | ||
| 10.1 / 10.2 / 10.3 / 10.3a / 10.4 | Activities in chronological order (driver slot) | ||
| 10 | Co-driver slot delimiter (slot 2) | ||
| 10a | Out of scope condition in the beginning of this day | ||
| 10.1 / 10.2 / 10.3 / 10.3a / 10.4 | Activities in chronological order (co-driver slot) | ||
| 11 | Daily summary delimiter | ||
| 11.1 | Summary of periods without card in driver slot | ||
| 11.4 | Places entered in chronological order | ||
| 11.5 | Positions after 3 hours accumulated driving time in chronological order | ||
| 11.7 | Activity totals | ||
| 11.2 | Summary of periods without card in co-driver slot | ||
| 11.4 | Places entered in chronological order | ||
| 11.5 | Positions after 3 hours accumulated driving time in chronological order | ||
| 11.8 | Activity totals | ||
| 11.3 | Summary of activities for a driver both slots included | ||
| 11.4 | Places entered by this driver in chronological order | ||
| 11.5 | Positions after 3 hours accumulated driving time in chronological order | ||
| 11.9 | Activity totals for this driver | ||
| 13.1 | Events faults delimiter | ||
| 13.4 | Event/Fault records (Last 5 events or faults stored or on-going in the VU) | ||
| 22.1 | Control place | ||
| 22.2 | Controller’s signature | ||
| 22.3 | From time (space available for a driver without a card to indicate | ||
| 22.4 | To time which periods are relevant to himself) | ||
| 22.5 | Driver's signature’ | ||
in point 3.7, paragraph PRT_014 is replaced by the following:
| 1 | Date and time at which the document is printed |
| 2 | Type of printout |
| 3 | Card holder identifications (of all cards inserted in the VU) |
| 23 | Most recent card inserted in the VU |
| 23.1 | Inserted cards (up to 88 records) |
| 12.3 | Faults delimiter’ |
Appendix 7 is amended as follows:
point 1.1 is replaced by the following:
Data may be downloaded to an ESM:
from a Vehicle Unit by an Intelligent Dedicated Equipment (IDE) connected to the VU,
from a tachograph card by an IDE fitted with a card interface device (IFD),
from a tachograph card via a vehicle unit by an IDE connected to the VU.
To give the possibility to verify the authenticity and integrity of downloaded data stored on an ESM, data is downloaded with a signature appended in accordance with Appendix 11 Common Security Mechanisms. The source equipment (VU or card) identification and its security certificates (Member state and equipment) are also downloaded. The verifier of the data must possess independently a trusted European public key.
Data downloaded from a VU are signed using Appendix 11 Common Security Mechanisms Part B (Second-generation tachograph system), except when drivers' control is performed by a non EU control authority, using a first generation control card, in which case data are signed using Appendix 11 Common Security Mechanisms Part A (First-generation tachograph system), as requested by Appendix 15 Migration, requirement MIG_015.
This Appendix specifies therefore two types of data downloads from the VU:
Generation 2 type of VU data download, providing the generation 2 data structure, signed using Appendix 11 Common Security Mechanisms Part B,
Generation 1 type of VU data download, providing the generation 1 data structure, signed using Appendix 11 Common Security Mechanisms Part A.
Similarly, there are two types of data downloads from second generation driver cards inserted in a VU, as specified in paragraphs 3 and 4 of this Appendix.’;
point 2.2.2 is amended as follows:
the table is replaced by the following:
| ‘Message Structure | Max 4 Bytes Header | Max 255 Bytes Data | 1 Byte CheckSum | ||||||
|---|---|---|---|---|---|---|---|---|---|
| IDE -> | <- VU | FMT | TGT | SRC | LEN | SID | DS_ / TRTP | DATA | CS |
| Start Communication Request | 81 | EE | F0 | 81 | E0 | ||||
| Positive Response Start Communication | 80 | F0 | EE | 03 | C1 | EA, 8F | 9B | ||
| Start Diagnostic Session Request | 80 | EE | F0 | 02 | 10 | 81 | F1 | ||
| Positive Response Start Diagnostic | 80 | F0 | EE | 02 | 50 | 81 | 31 | ||
| Link Control Service | |||||||||
| Verify Baud Rate (stage 1) | |||||||||
| 9 600 Bd | 80 | EE | F0 | 04 | 87 | 01,01,01 | EC | ||
| 19 200 Bd | 80 | EE | F0 | 04 | 87 | 01,01,02 | ED | ||
| 38 400 Bd | 80 | EE | F0 | 04 | 87 | 01,01,03 | EE | ||
| 57 600 Bd | 80 | EE | F0 | 04 | 87 | 01,01,04 | EF | ||
| 115 200 Bd | 80 | EE | F0 | 04 | 87 | 01,01,05 | F0 | ||
| Positive Response Verify Baud Rate | 80 | F0 | EE | 02 | C7 | 01 | 28 | ||
| Transition Baud Rate (stage 2) | 80 | EE | F0 | 03 | 87 | 02,03 | ED | ||
| Request Upload | 80 | EE | F0 | 0A | 35 | 00,00,00, 00,00,FF,FF, FF,FF | 99 | ||
| Positive Response Request Upload | 80 | F0 | EE | 03 | 75 | 00,FF | D5 | ||
| Transfer Data Request | |||||||||
| Overview | 80 | EE | F0 | 02 | 36 | 01 or 21 | 97 | ||
| Activities | 80 | EE | F0 | 06 | 36 | 02 or 22 | Date | CS | |
| Events & Faults | 80 | EE | F0 | 02 | 36 | 03 or 23 | Date | 99 | |
| Detailed Speed | 80 | EE | F0 | 02 | 36 | 04 or 24 | Date | 9A | |
| Technical Data | 80 | EE | F0 | 02 | 36 | 05 or 25 | Date | 9B | |
| Card download | 80 | EE | F0 | 02 | 36 | 06 | Slot | CS | |
| Positive Response Transfer Data | 80 | F0 | EE | Len | 76 | TREP | Data | CS | |
| Request Transfer Exit | 80 | EE | F0 | 01 | 37 | 96 | |||
| Positive Response Request Transfer Exit | 80 | F0 | EE | 01 | 77 | D6 | |||
| Stop Communication Request | 80 | EE | F0 | 01 | 82 | E1 | |||
| Positive Response Stop Communication | 80 | F0 | EE | 01 | C2 | 21 | |||
| Acknowledge sub message | 80 | EE | F0 | Len | 83 | Data | CS | ||
| Negative responses | |||||||||
| General reject | 80 | F0 | EE | 03 | 7F | Sid Req | 10 | CS | |
| Service not supported | 80 | F0 | EE | 03 | 7F | Sid Req | 11 | CS | |
| Sub function not supported | 80 | F0 | EE | 03 | 7F | Sid Req | 12 | CS | |
| Incorrect Message Length | 80 | F0 | EE | 03 | 7F | Sid Req | 13 | CS | |
| Conditions not correct or Request sequence error | 80 | F0 | EE | 03 | 7F | Sid Req | 22 | CS | |
| Request out of range | 80 | F0 | EE | 03 | 7F | Sid Req | 31 | CS | |
| Upload not accepted | 80 | F0 | EE | 03 | 7F | Sid Req | 50 | CS | |
| Response pending | 80 | F0 | EE | 03 | 7F | Sid Req | 78 | CS | |
| Data not available | 80 | F0 | EE | 03 | 7F | Sid Req | FA | CS’ | |
the following indents are added to the Notes after the table:
‘TRTP 21 to 25 are used for Generation 2 type of VU data download requests, TRTP 01 to 05 are used for Generation 1 type of VU data download requests, which can only be accepted by the VU in the frame of drivers' control performed by a non EU control authority, using a first generation control card,
TRTP 11 to 19 and 31 to 39 are reserved for manufacturer specific download requests.’;
point 2.2.2.9 is amended as follows:
paragraph DDP_011 is replaced by the following:
There are six types of data transfer. For VU data download, two different TRTP values can be used for each transfer type:
| Data transfer type | TRTP value for generation 1 type of VU data download | TRTP value for generation 2 type of VU data download |
|---|---|---|
| Overview | 01 | 21 |
| Activities of a specified date | 02 | 22 |
| Events and faults | 03 | 23 |
| Detailed speed | 04 | 24 |
| Technical data | 05 | 25 |
| Data transfer type | TRTP value |
| Card download | 06’ |
paragraph DDP_054 is replaced by the following:
In the second case (TRTP 02 or 22) the Transfer Data Request message includes the indication of the calendar day ( format) to be downloaded.’;
in point 2.2.2.10, paragraph DDP_055 is replaced by the following:
Security certificates,
Vehicle identification,
VU current date and time,
Min and Max downloadable date (VU data),
Indication of cards presence in the VU,
Previous download to a company,
Company locks,
Previous controls.’;
in point 2.2.2.16, the last dash in paragraph DDP_018 is replaced by the following:
‘FA data not available
The data object of a data transfer request are not available in the VU (e.g. no card is inserted, generation 1 type of VU data download requested outside the frame of a driver’s control by a non EU control authority…).’;
point 2.2.6.1 is amended as follows:
the first sub-paragraph in paragraph DDP_029 is replaced by the following:
‘The data field of the “Positive Response Transfer Data Overview” message shall provide the following data in the following order under the SID 76 Hex, the TREP 01 or 21 Hex and appropriate sub message splitting and counting:’;
the heading ‘Data structure generation 1’ is replaced by the following:
‘Data structure generation 1 (TREP 01 Hex)’;
the heading “Data structure generation 2” is replaced by the following:
‘Data structure generation 2 (TREP 21 Hex)’;
point 2.2.6.2 is amended as follows:
the first sub-paragraph in paragraph DDP_030 is replaced by the following:
‘The data field of the “Positive Response Transfer Data Activities” message shall provide the following data in the following order under the SID 76 Hex, the TREP 02 or 22 Hex and appropriate sub message splitting and counting:’;
the heading ‘Data structure generation 1’ is replaced by the following:
‘Data structure generation 1 (TREP 02 Hex)’;
the heading ‘Data structure generation 2’ is replaced by the following:
‘Data structure generation 2 (TREP 22 Hex)’;
the item VuGNSSCDRecordArray under the heading ‘Data structure generation 2 (TREP 22 Hex)’, is replaced by the following:
point 2.2.6.3 is amended as follows:
the first sub-paragraph in paragraph DDP_031 is replaced by the following:
‘The data field of the “Positive Response Transfer Data Events and Faults” message shall provide the following data in the following order under the SID 76 Hex, the TREP 03 or 23 Hex and appropriate sub message splitting and counting:’;
the heading ‘Data structure generation 1’ is replaced by the following:
‘Data structure generation 1 (TREP 03 Hex)’;
the heading ‘Data structure generation 2’ is replaced by the following:
‘Data structure generation 2 (TREP 23 Hex)’;
the item VuTimeAdjustmentGNSSRecordArray under the heading ‘Data structure generation 2 (TREP 23 Hex)’ is deleted;
point 2.2.6.4 is amended as follows:
the first sub-paragraph in paragraph DDP_032 is replaced by the following:
‘The data field of the “Positive Response Transfer Data Detailed Speed” message shall provide the following data in the following order under the SID 76 Hex, the TREP 04 or 24 Hex and appropriate sub message splitting and counting:’;
the heading ‘Data structure generation 1’ is replaced by the following:
‘Data structure generation 1 (TREP 04)’;
the heading ‘Data structure generation 2’ is replaced by the following:
‘Data structure generation 2 (TREP 24)’;
point 2.2.6.5 is amended as follows:
the first sub-paragraph in paragraph DDP_033 is replaced by the following:
‘The data field of the “Positive Response Transfer Data Technical Data” message shall provide the following data in the following order under the SID 76 Hex, the TREP 05 or 25 Hex and appropriate sub message splitting and counting:’;
the heading ‘Data structure generation 1’ is replaced by the following:
‘Data structure generation 1 (TREP 05)’;
the heading ‘Data structure generation 2’ is replaced by the following:
‘Data structure generation 2 (TREP 25)’;
in point 3.3, paragraph DDP_035 is replaced by the following:
Download the common information of the card in the EFs and
This information is optional and is not secured with a digital signature.
(for first and second generation tachograph cards) Download EFs within :
Download the EFs and
This information is not secured with a digital signature.
It is mandatory to download these files for each download session.
Download the other application data EFs (within ) except EF
. This information is secured with a digital signature, using Appendix 11 Common Security Mechanisms Part A.
It is mandatory to download at least the EFs and
for each download session.
When downloading a driver card it is also mandatory to download the following EFs:
(for second generation tacograph cards only) Except when a download of a driver card inserted in a VU is performed during drivers' control by a non EU control authority, using a first generation control card, download EFs within :
Download the EFs CardSignCertificate, CA_Certificate and Link_Certificate (if present). This information is not secured with a digital signature.
It is mandatory to download these files for each download session.
Download the other application data EFs (within ) except EF
. This information is secured with a digital signature, using Appendix 11 Common Security Mechanisms Part B.
It is mandatory to download at least the EFs and
for each download session.
When downloading a driver card it is also mandatory to download the following EFs:
When downloading a driver card, update the date in EF
, in the
and, if applicable,
DFs.
When downloading a workshop card, reset the calibration counter in EF in the
and, if applicable,
DFs.
When downloading a workshop card the EF in the
and, if applicable,
DFs shall not be downloaded.’;
in point 3.3.2, the first subparagraph in paragraph DDP_037 is replaced by the following:
‘The sequence to download EFs ICC, IC, Card_Certificate (or CardSignCertificate for DF Tachograph_G2), CA_Certificate and Link_Certificate (for DF Tachograph_G2 only) is as follows:’;
in point 3.3.3, the table is replaced by the following:
in point 3.4.2, paragraph DDP_046 is replaced by the following:
Example of data in a download file on an ESM:
in point 4, paragraph DDP_049 is replaced by the following:
Second generation driver cards: the VU shall then download the whole card, file by file, in accordance with the card downloading protocol defined in paragraph 3, and forward all data received from the card to the IDE within the appropriate TLV file format (see 3.4.2) and encapsulated within a “Positive Response Transfer Data” message.’;
in point 2 of Appendix 8, the paragraph under the heading ‘references’ is replaced by the following:
‘ISO 14230-2: Road Vehicles -Diagnostic Systems — Keyword Protocol 2000- Part 2: Data Link Layer.
First edition: 1999.’;
Appendix 9 is amended as follows:
in the Table of Contents, point 6 is replaced by the following:
in point 1.1, the first dash is replaced by the following:
‘a security certification, based on Common Criteria specifications, against a security target fully compliant with Appendix 10 to this Annex,’;
in point 2, the table of the vehicle unit functional tests is replaced by the following:
| ‘No | Test | Description | Related requirements |
|---|---|---|---|
| 1 | Administrative examination | ||
| 1.1 | Documentation | Correctness of documentation | |
| 1.2 | Manufacturer test results | Results of manufacturer test performed during integration. Paper demonstrations. | 88, 89,91 |
| 2 | Visual inspection | ||
| 2,1 | Compliance with documentation | ||
| 2.2 | Identification / markings | 224 to 226 | |
| 2.3 | Materials | 219 to 223 | |
| 2.4 | Sealing | 398, 401 to 405 | |
| 2.5 | External interfaces | ||
| 3 | Functional tests | ||
| 3.1 | Functions provided | 02, 03, 04, 05, 07, 382 | |
| 3.2 | Modes of operation | 09 to 11*, 134, 135 | |
| 3.3 | Functions and data access rights | 12* 13*, 382, 383, 386 to 389 | |
| 3.4 | Monitoring cards insertion and withdrawal | 15, 16, 17, 18, 19*, 20*, 134 | |
| 3.5 | Speed and distance measurement | 21 to 31 | |
| 3.6 | Time measurement (test performed at 20 °C) | 38 to 43 | |
| 3.7 | Monitoring driver activities | 44 to 53, 134 | |
| 3.8 | Monitoring driving status | 54, 55, 134 | |
| 3.9 | Manual entries | 56 to 62 | |
| 3.10 | Company locks management | 63 to 68 | |
| 3.11 | Monitoring control activities | 69, 70 | |
| 3.12 | Detection of events and/or faults | 71 to 88, 134 | |
| 3.13 | Equipment identification data | 93*, 94*, 97, 100 | |
| 3.14 | Driver card insertion and withdrawal data | 102* to 104* | |
| 3.15 | Driver activity data | 105* to 107* | |
| 3.16 | Places and positions data | 108* to 112* | |
| 3.17 | Odometer data | 113* to 115* | |
| 3.18 | Detailed speed data | 116* | |
| 3.19 | Events data | 117* | |
| 3.20 | Faults data | 118* | |
| 3.21 | Calibration data | 119* to 121* | |
| 3.22 | Time adjustment data | 124*, 125* | |
| 3.23 | Control activity data | 126*, 127* | |
| 3.24 | Company locks data | 128* | |
| 3.25 | Download activity data | 129* | |
| 3.26 | Specific conditions data | 130*, 131* | |
| 3.27 | Recording and storing on tachographs cards | 136, 137, 138*, 139*, 141*, 142, 143 144, 145, 146*, 147*, 148*, 149, 150 | |
| 3.28 | Displaying | 90, 134, 151 to 168, PIC_001, DIS_001 | |
| 3.29 | Printing | 90, 134, 169 to 181, PIC_001, PRT_001 to PRT_014 | |
| 3.30 | Warning | 134, 182 to 191, PIC_001 | |
| 3.31 | Data downloading to external media | 90, 134, 192 to 196 | |
| 3.32 | Remote communication for targeted roadside checks | 197 to 199 | |
| 3.33 | Output data to additional external devices | 200, 201 | |
| 3.34 | Calibration | 202 to 206*, 383, 384, 386 to 391 | |
| 3.35 | Roadside calibration checking | 207 to 209 | |
| 3.36 | Time adjustment | 210 to 212* | |
| 3.37 | Non-interference of additional functions | 06, 425 | |
| 3.38 | Motion sensor interface | 02, 122 | |
| 3.39 | External GNSS facility | 03, 123 | |
| 3.40 | Verify that the VU detects, records and stores the event(s) and/or fault(s) defined by the VU manufacturer when a paired motion sensor reacts to magnetic fields disturbing vehicle motion detection. | 217 | |
| 3.41 | Cypher suite and standardized domain parameters | CSM_48, CSM_50 | |
| 4 | Environmental tests | ||
| 4.1 | Temperature | Verify functionality through:
| 213 |
| 4.2 | Humidity | Verify that the vehicle unit can withstand a cyclic damp (heat test) through IEC 60068-2-30, test Db, six 24 hours cycles, each temperature varying from +25 °C to + 55 °C and a relative humidity of 97 % at + 25 °C and equal to 93 % at +55 °C | 214 |
| 4.3 | Mechanical | 1. Sinusoidal vibrations. verify that the vehicle unit can withstand sinusoidal vibrations with the following characteristics:
2. Random vibrations: Test according to ISO 16750-3: Chapter 4.1.2.8: Test VIII: Commercial vehicle, decoupled vehicle cab Random vibration test, 10…2000 Hz, RMS vertical 21,3 m/s2, RMS longitudinal 11,8 m/s2, RMS lateral 13,1 m/s2, 3 axes, 32 h per axis, including temperature cycle – 20…70 °C. This test refers to IEC 60068-2-64: Environmental testing - Part 2-64: Tests - Test Fh: Vibration, broadband random and guidance 3. Shocks: mechanical shock with 3 g half sinus according ISO 16750. The tests described above are performed on different samples of the equipment type being tested. | 219 |
| 4.4 | Protection against water and foreign bodies | Test according to ISO 20653: Road vehicles – Degree of protection (IP code) – Protection of electrical equipment against foreign objects, water and access (No change in parameters); Minimum value IP 40 | 220, 221 |
| 4.5 | Over-voltage protection | Verify that the vehicle unit can withstand a power supply of: 24 V versions : 34V at + 40 °C 1 hour 12V versions : 17V at + 40 °C 1 hour (ISO 16750-2) | 216 |
| 4.6 | Reverse polarity protection | Verify that the vehicle unit can withstand an inversion of its power supply (ISO 16750-2) | 216 |
| 4.7 | Short-circuit protection | Verify that input output signals are protected against short circuits to power supply and ground (ISO 16750-2) | 216 |
| 5 | EMC tests | ||
| 5.1 | Radiated emissions and susceptibility | Compliance with Regulation ECE R10 | 218 |
| 5.2 | Electrostatic discharge | Compliance with ISO 10605:2008 + Technical Corrigendum:2010 + AMD1:2014: +/– 4 kV for contact and +/– 8 kV for air discharge | 218 |
| 5.3 | Conducted transient susceptibility on power supply | For 24V versions: compliance with ISO 7637-2 + ECE Regulation No. 10 Rev. 3:
For 12V versions: compliance with ISO 7637– 1 + ECE Regulation No. 10 Rev. 3:
For load dump proposal, refer to ISO 16750-2, 4th edition, chapter 4.6.4. | 218’ |
point 6 is replaced by the following:
| No | Test | Description | Related requirements | |
|---|---|---|---|---|
| 1. | Administrative examination | |||
| 1.1 | Documentation | Correctness of documentation | ||
| 2. | Visual inspection | |||
| 2.1. | Compliance with documentation | |||
| 2.2. | Identification / markings | 225, 226 | ||
| 2.3 | Materials | 219 to 223 | ||
| 3. | Functional tests | |||
| 3.1 | Remote communication for targeted roadside checks | 4, 197 to 199 | ||
| 3.2 | Recording and storing in data memory | 91 | ||
| 3.3 | Communication with Vehicle Unit | Appendix 14 DSC_66 to DSC_70, DSC_71 to DSC_76 | ||
| 4. | Environmental tests | |||
| 4.1 | Temperature | Verify functionality through:
| 213 | |
| 4.2 | Protection against water and foreign bodies | Test according to ISO 20653: Road vehicles – Degree of protection (IP code) – Protection of electrical equipment against foreign objects, water and access (targeted value IP40) | 220, 221 | |
| 5 | EMC tests | |||
| 5.1 | Radiated emissions and susceptibility | Compliance with Regulation ECE R10 | 218 | |
| 5.2 | Electrostatic discharge | Compliance with ISO 10605:2008 + Technical Corrigendum:2010 + AMD1:2014: +/– 4 kV for contact and +/– 8 kV for air discharge | 218 | |
| 5.3 | Conducted transient susceptibility on power supply | For 24V versions: compliance with ISO 7637-2 + ECE Regulation No. 10 Rev. 3:
For 12V versions: compliance with ISO 7637-1 + ECE Regulation No. 10 Rev. 3:
For load dump proposal, refer to ISO 16750-2, 4th edition, chapter 4.6.4. | 218’ | |
the table in point 8 on interoperability tests is replaced by the following:
| ‘No | Test | Description |
|---|---|---|
| 8.1 Interoperability tests between vehicle units and tachograph cards | ||
| 1 | Mutual authentication | Check that the mutual authentication between the vehicle unit and the tachograph card runs normally |
| 2 | Write/read tests | Execute a typical activity scenario on the vehicle unit. The scenario shall be adapted to the type of card being tested and involve writings in as many EFs as possible in the card Verify through a vehicle unit downloading that all corresponding recordings have been properly made Verify through a card downloading that all corresponding recordings have been properly made Verify through daily printouts that all corresponding recordings can be properly read |
| 8.2 Interoperability tests between vehicle units and motion sensors | ||
| 1 | Pairing | Check that the pairing between the vehicle units and the motion sensors runs normally |
| 2 | Activity tests | Execute a typical activity scenario on the motion sensor. The scenario shall involve a normal activity and creating as many events or faults as possible. Verify through a vehicle unit downloading that all corresponding recordings have been properly made Verify through a card downloading that all corresponding recordings have been properly made Verify through a daily printout that all corresponding recordings can be properly read |
| 8.3 Interoperability tests between vehicle units and external GNSS facilities (when applicable) | ||
| 1 | Mutual authentication | Check that the mutual authentication (coupling) between the vehicle unit and the external GNSS module runs normally. |
| 2 | Activity tests | Execute a typical activity scenario on the external GNSS facility. The scenario shall involve a normal activity and creating as many events or faults as possible. Verify through a vehicle unit downloading that all corresponding recordings have been properly made Verify through a card downloading that all corresponding recordings have been properly made Verify through a daily printout that all corresponding recordings can be properly read’ |
Appendix 11 is amended as follows:
in point 8.2.3, paragraph CSM_49 is replaced by the following:
in point 9.1.2, the first sub-paragraph of paragraph CSM_58 is replaced by the following:
in point 9.1.4, paragraph CSM_72 is replaced by the following:
point 9.1.5 is amended as follows:
paragraph CSM_83 is replaced by the following:
paragraph CSM_88 is replaced by the following:
For driver cards: 5 years
For company cards: 5 years
For control cards: 2 years
For workshop cards: 1 year’;
the following text is added in paragraph CSM_91:
‘Additionally, for control cards, company cards and workshop cards only, and only if such cards are issued during the first three months of the validity period of a new EUR certificate: the EUR certificate that is two generations older, if existing.
Note to last bullet: For example, in the first three months of the ERCA(3) certificate (see Figure 1), the mentioned cards shall contain the ERCA(1) certificate. This is needed to ensure that these cards can be used to perform data downloads from ERCA(1) VUs whose normal 15-year life period plus the 3-months data downloading period expires during these months; see the last bullet of requirement 13) in Annex IC.’;
point 9.1.6 is amended as follows:
paragraph CSM_93 is replaced by the following:
paragraph CSM_95 is replaced by the following:
point 9.1.7 is amended as follows:
point 9.2.1.1 is amended as follows:
in paragraph CSM_106, the first dash is replaced by the following:
‘For 128-bit motion sensor master keys: CV = “B6 44 2C 45 0E F8 D3 62 0B 7A 8A 97 91 E4 5D 83” ’;
in paragraph CSM_107, the first sub-paragraph is replaced by the following:
‘Each Motion sensor manufacturer shall generate a random and unique pairing key KP for every motion sensor, and shall send each pairing key to its Member State Certificate Authority. The MSCA shall encrypt each pairing key separately with the motion sensor master key KM and shall return the encrypted key to the motion sensor manufacturer. For each encrypted key, the MSCA shall notify the motion sensor manufacturer of the version number of the associated KM.’;
paragraph CSM_108 is replaced by the following:
point 9.2.2.1 is amended as follows:
paragraph CSM_123 is replaced by the following:
This VU serial number shall be identical to the vuSerialNumber element of VuIdentification, see Appendix 1 and to the Certificate Holder Reference in the VU’s certificates.
The VU serial number may not be known at the moment a vehicle unit manufacturer requests the VU-specific DSRC keys. In this case, the VU manufacturer shall send instead the unique certificate request ID it used when requesting the VU’s certificates; see CSM_153. This certificate request ID shall therefore be equal to the Certificate Holder Reference in the VU’s certificates.’;
in paragraph CSM_124, the info requirement in step 2 is replaced by the following:
‘info = VU serial number or certificate request ID, as specified in CSM_123’;
in point 9.3.1, the first sub-paragraph in paragraph CSM_135 is replaced by the following:
‘The Distinguished Encoding Rules (DER) according to [ISO 8825-1] shall be used to encode the data objects within certificates. Table 4 shows the full certificate encoding, including all tag and length bytes.’;
in point 9.3.2.3, paragraph CSM_141 is replaced by the following:
in point 9.3.2.5, the following sub-paragraph is added in paragraph CSM_146:
‘Note: For a card certificate, the value of the CHR shall be equal to the value of the cardExtendedSerialNumber in EF_ICC; see Appendix 2. For an EGF certificate, the value of the CHR shall be equal to the value of the sensorGNSSSerialNumber in EF_ICC; see Appendix 14. For a VU certificate, the value of the CHR shall be equal to the vuSerialNumber element of VuIdentification, see Appendix 1, unless the manufacturer does not know the manufacturer-specific serial number at the time the certificate is requested.’;
in point 9.3.2.6, paragraph CSM_148 is replaced by the following:
point 9.3.3 is amended as follows:
in paragraph CSM_151, the first sub-paragraph is replaced by the following:
‘When requesting a certificate, an MSCA shall send the following data to the ERCA:’;
paragraph CSM_153 is replaced by the following:
If known (see CSM_154), a serial number for the equipment, unique for the manufacturer, the equipment's type and the month of manufacturing. Otherwise, a unique certificate request identifier.
The month and the year of equipment manufacturing or of the certificate request.
The manufacturer shall ensure that this data is correct and that the certificate returned by the MSCA is inserted in the intended equipment.’;
point 10.2.1 is amended as follows:
in paragraph CSM_157, the text before the Notes to Figure 4 is replaced by the following:
‘Vehicle units shall use the protocol depicted in Figure 4 for verifying a tachograph card’s certificate chain. For every certificate it reads from the card, the VU shall verify that the Certificate Holder Authorisation (CHA) field is correct:
The CHA field of the Card certificate shall indicate a card certificate for mutual authentication (see Appendix 1, data type EquipmentType).
The CHA of the Card.CA certificate shall indicate an MSCA.
The CHA of the Card.Link certificate shall indicate the ERCA.’;
in paragraph CSM_159, the following sentence is added:
‘Whereas storing of all other types of certificate is optional, it is mandatory for a VU to store a new link certificate presented by a card.’;
point 10.2.2 is amended as follows:
in paragraph CSM_161, the text before the Figure 5 is replaced by the following:
‘Tachograph cards shall use the protocol depicted in Figure 5 for verifying a VU's certificate chain. For every certificate presented by the VU, the card shall verify that the Certificate Holder Authorisation (CHA) field is correct:
The CHA of the VU.Link certificate shall indicate the ERCA.
The CHA of the VU.CA certificate shall indicate an MSCA.
The CHA field of the VU certificate shall indicate a VU certificate for mutual authentication (see Appendix 1, data type EquipmentType).’;
paragraph CSM_165 is replaced by the following:
point 10.3 is amended as follows:
the first sub-paragraph in paragraph CSM_170 is replaced by the following:
‘Next to the card challenge, the VU shall include in the signature the certificate holder reference taken from the card certificate.’;
in paragraph CSM_171, Figure 6 is replaced by the following:
’
paragraph CSM_174 is replaced by the following:
Calculate the authentication token by concatenating Card.CHR, the card challenge rcard and the identifier of the VU ephemeral public key Comp(VU.PKeph),
Verify the VU’s signature using the ECDSA algorithm, using the hashing algorithm linked to the key size of the VU’s VU_MA key pair as specified in CSM_50, in combination with VU.PK and the calculated authentication token.’;
in point 10.4, paragraph CSM_176 is amended as follows:
sub-paragraph 2 is replaced by the following:
The VU sends the public point VU.PKeph of its ephemeral key pair to the card. The public point shall be converted to an octet string as specified in [TR-03111]. The uncompressed encoding format shall be used. As explained in CSM_164, the VU generated this ephemeral key pair prior to the verification of the VU certificate chain. The VU sent the identifier of the ephemeral public key Comp(VU.PKeph) to the card, and the card stored it.’;
sub-paragraph 6 is replaced by the following:
Using KMAC, the card computes an authentication token over the VU ephemeral public point: TPICC = CMAC(KMAC, VU.PKeph). The public point shall be in the format used by the VU (see bullet 2 above). The card sends NPICC and TPICC to the vehicle unit.’;
in point 10.5.2, paragraph CSM_191 is replaced by the following:
Note: Padding for Secure Messaging is always performed by the secure messaging layer, not by the CMAC or CBC algorithms.
A command APDU with applied Secure Messaging will have the following structure, depending on the case of the respective unsecured command (DO is data object):
:
CLA INS P1 P2 || Lc' || DO ‘8E’ || Le
:
CLA INS P1 P2 || Lc' || DO ‘97’ || DO‘8E’ || Le
:
CLA INS P1 P2 || Lc' || DO ‘81’ || DO‘8E’ || Le
:
CLA INS P1 P2 || Lc' || DO ‘B3’ || DO‘8E’ || Le
:
CLA INS P1 P2 || Lc' || DO ‘81’ || DO‘97’ || DO‘8E’ || Le
:
CLA INS P1 P2 || Lc' || DO ‘B3’ || DO‘97’ || DO‘8E’ || Le
where Le = ‘00’ or ‘00 00’ depending on whether short length fields or extended length fields are used; see [ISO 7816-4].
A response APDU with applied Secure Messaging will have the following structure, depending on the case of the respective unsecured response:
:
DO ‘99’ || DO ‘8E’ || SW1SW2
:
DO ‘81’ || DO ‘99’ || DO ‘8E’ || SW1SW2
:
DO ‘87’ || DO ‘99’ || DO ‘8E’ || SW1SW2
:
DO ‘B3’ || DO ‘99’ || DO ‘8E’ || SW1SW2
Note: Case 2 or 4 (odd INS byte) with encryption is never used in the communication between a VU and a card.
Below are three example APDU transformations for commands with even INS code. Figure 8 shows an authenticated Case 4 command APDU, Figure 9 shows an authenticated Case 1/Case 3 response APDU, and Figure 10 shows an encrypted and authenticated Case 2/Case 4 response APDU.
’
in point 10.5.3, paragraph CSM_193 is replaced by the following:
it receives a plain command APDU,
it detects a Secure Messaging error in a command APDU:
An expected Secure Messaging data object is missing, the order of data objects is incorrect, or an unknown data object is included.
A Secure Messaging data object is incorrect, e.g. the MAC value is incorrect or the TLV structure is incorrect.
it is depowered or reset,
the VU starts the VU Authentication process,
the limit for the number of commands and associated responses within the current session is reached. For a given card, this limit shall be defined by its manufacturer, taking into account the security requirements of the hardware used, with a maximum value of 240 SM commands and associated responses per session’;
point 11.3.2 is amended as follows:
the first sub-paragraph of paragraph CSM_208 is replaced by the following:
‘During the coupling to a VU, an external GNSS facility shall use the protocol depicted in Figure 5 (section 10.2.2) for verifying the VU's certificate chain’;
in point 11.3.3, the first sub-paragraph in paragraph CSM_211, is replaced by the following:
‘During normal operation, a vehicle unit and an EGF shall use the protocol depicted in Figure 11 for verifying the temporal validity of the stored EGF_MA certificate and for setting the VU_MA public key for subsequent VU Authentication. No further mutual verification of the certificate chains shall take place during normal operation.’;
in point 12.3, Table 6 is replaced by the following:
Number of plaintext and encrypted data bytes per instruction defined in [ISO 16844-3]
| Instruction | Request / reply | Description of data | # of plaintext data bytes according to[ISO 16844-3] | # of plaintext data bytes using AES keys | # of encrypted data bytes when using AES keys of bitlength | ||
|---|---|---|---|---|---|---|---|
| 128 | 192 | 256 | |||||
| 10 | request | Authentication data + file number | 8 | 8 | 16 | 16 | 16 |
| 11 | reply | Authentication data + file contents | 16 or 32, depend on file | 16 or32, depend on file | 32 / 48 | 32 / 48 | 32 / 48 |
| 41 | request | MoS serial number | 8 | 8 | 16 | 16 | 16 |
| 41 | reply | Pairing key | 16 | 16 / 24 / 32 | 16 | 32 | 32 |
| 42 | request | Session key | 16 | 16 / 24 / 32 | 16 | 32 | 32 |
| 43 | request | Pairing information | 24 | 24 | 32 | 32 | 32 |
| 50 | reply | Pairing information | 24 | 24 | 32 | 32 | 32 |
| 70 | request | Authentication data | 8 | 8 | 16 | 16 | 16 |
| 80 | reply | MoS counter value + auth. data | 8 | 8 | 16 | 16 | 16’ |
in point 13.1, the requirement on the VU serial number in subparagraph CSM_224 is replaced by the following:
the VU’s serial number or certificate request ID (data type VuSerialNumber or CertificateRequestID) – see CSM_123’;
in point 13.3, the second indent in paragraph CSM_228 is replaced by the following:
The control card shall use the indicated DSRC master key in combination with the VU serial number or the certificate request ID in the DSRC security data to derive the VU-specific DSRC keys K_VUDSRC_ENC and K_VUDSRC_MAC, as specified in CSM_124.’;
point 14.3 is amended as follows:
in paragraph CSM_234, the text before the Notes to figure 13 is replaced by the following:
‘An IDE may perform verification of a signature over downloaded data itself or it may use a control card for this purpose. In case it uses a control card, signature verification shall take place as shown in Figure 13. For verifying the temporal validity of a certificate presented by the IDE, the control card shall use its internal current time, as specified in CSM_167. The control card shall update its current time if the Effective Date of an authentic ‘valid source of time’ certificate is more recent than the card’s current time. The card shall accept only the following certificates as a valid source of time:
Second-generation ERCA link certificates
Second-generation MSCA certificates
Second-generation VU_Sign or Card_Sign certificates issued by the same country as the control card’s own card certificate.
In case it performs signature verification itself, the IDE shall verify the authenticity and validity of all certificates in the certificate chain in the data file, and it shall verify the signature over the data following the signature scheme defined in [DSS]. In both cases, for every certificate read from the data file, it is necessary to verify that the Certificate Holder Authorisation (CHA) field is correct:
The CHA field of the EQT certificate shall indicate a VU or Card (as applicable) certificate for signing (see Appendix 1, data type EquipmentType).
The CHA of the EQT.CA certificate shall indicate an MSCA.
The CHA of the EQT.Link certificate shall indicate the ERCA.’;
Appendix 12 is amended as follows:
point 3 is amended as follows:
in paragraph GNS_4, the second sub-paragraph after Figure 2 is replaced by the following:
‘The resolution of the position is based on the format of the RMC sentence described above. The first part of the fields 3) and 5) are used to represent the degrees. The rest are used to represent the minutes with three decimals. So the resolution is 1/1000 of minute or 1/60000 of degree (because one minute is 1/60 of a degree).’;
Paragraph GNS_5 is replaced by the following:
The GPS DOP and active satellites (GSA) command can be used by the VU to determine and record the signal availability and accuracy. In particular the HDOP is used to provide an indication on the level of accuracy of the recorded location data (see 4.2.2). The VU will store the value of the Horizontal Dilution of Precision (HDOP) calculated as the minimum of the HDOP values collected on the available GNSS systems.
The GNSS Id. indicates the corresponding NMEA Id. for every GNSS constellation and Satellite-Based Augmentation System (SBAS).
’
point 4.2.1 is amended as follows:
paragraph GNS_16 is replaced by the following:
paragraph GNS_18 is replaced by the following:
paragraph GNS_20 is replaced by the following:
The mapping of record numbers and data is provided in Table 1. Note that there are five GSA sentences for the GNSS constellations and Satellite-Based Augmentation System (SBAS).’;
in point 4.2.2, sub-paragraph 5 in paragraph GNS_23 is replaced by the following:
The VU processor checks the received data extracting the information (e.g., latitude, longitude, time) from the RMC NMEA sentence. The RMC NMEA sentence includes the information if the position is valid. If the position is not valid, the location data is not available yet and it cannot be used to record the position of the vehicle. If the position is valid, the VU processor also extracts the values of HDOP from GSA NMEA sentences and calculate the minimum value on the available satellite systems (i.e., when the fix is available).’;
In point 4.4.1, paragraph GNS_28 is replaced by the following:
in point 4.4.2, paragraph GNS_29 is replaced by the following:
in point 4.4.3, paragraph GNS_30 is replaced by the following:
in point 4.4.4, the text in paragraph GNS_31 until Figure 4, is replaced by the following:
‘If the VU detects that the EGF certificate used for mutual authentication is not valid any longer, the VU shall generate and record a recording equipment event of type EventFaultType enum ‘1B’H External GNSS facility certificate expired with a timestamp equal to the current value of time. The VU shall still use the received GNSS position data.’;
in point 5.2.1, paragraph GNS_34 is replaced by the following:
point 6 is replaced by the following:
If the VU detects a discrepancy of more than 1 minute between the time of the vehicle unit's time measurement function and the time originating from the GNSS receiver, the VU will record an event of type EventFaultType enum ‘0B’H Time conflict (GNSS versus VU internal clock). After a time conflict event has been triggered, the VU will not check the time discrepancy for the next 12 hours. This event shall not be triggered in cases no valid GNSS signal was detectable by the GNSS receiver within the last 30 days.’;
Appendix 13 is amended as follows:
in point 2, the fourth paragraph is replaced by the following:
‘For clarification, this Appendix does not specify:
The collection of the Data operation and management within the VU (which shall be specified elsewhere within the Regulation or otherwise shall be a function of product design).
The form of presentation of collected data to application hosted on the external device.
Data security provisions above what provides Bluetooth® (such as encryption) concerning the content of the Data (which shall be specified elsewhere within the Regulation [Appendix 11 Common Security Mechanisms]).
The Bluetooth® protocols used by the ITS interface’;
in point 4.2, the third paragraph is replaced by the following:
‘When an external device comes within range of the VU for the first time, the Bluetooth® pairing process can be initiated (see also annex 2). The devices share their addresses, names, and profiles and common secret key, which allows them to bond whenever they are together in the future. Once this step is completed, the external device is trusted and is in state to initiate requests to download data from the tachograph. It is not foreseen to add encryption mechanisms beyond what Bluetooth® provides. However, if additional security mechanisms are needed, this will be done in accordance with Appendix 11 Common Security Mechanisms.’;
point 4.3 is amended as follows:
the first paragraph is replaced by the following:
‘For security reasons, the VU will require a PIN code authorization system separated from the Bluetooth pairing. Each VU shall be able to generate PIN codes for authentication purposes composed of at least 4 digits. Every time an external device pairs with the VU, it must provide the correct PIN code before receiving any data.’;
the third paragraph after Table 1 is replaced by the following:
‘While the manufacturer may offer an option to change the PIN code directly through the VU, the PUC code shall not be alterable. Modifying the PIN code, if possible, shall require to enter the current PIN code directly in the VU.’;
in point 4.4, the second paragraph after the heading "Data Field" is replaced by the following:
‘If the data to be handled is larger than the available space in one message, it will be split in several submessages. Each submessage shall have the same Header and SID, but will contain a 2-bytes counter, Counter Current (CC) and Counter Max (CM), to indicate the submessage number. To enable error checking and abort the receiving device acknowledges every submessage. The receiving device can accept the submessage, ask for it to be re-transmitted, request the sending device to start again or abort the transmission.’;
Annex 1 is amended as follows:
the heading is replaced by the following:
‘(1)LIST OF AVAILABLE DATA THROUGH THE ITS INTERFACE’;
the following item is inserted in the table in point (3), after the item ‘Absence of position information from GNSS receiver’:
| ‘Communication error with the external GNSS facility |
|
|
in point (5), the following dash is added:
‘ITS interface fault (if applicable)’;
the ASN.1 specifications in Annex 3 are amended as follows:
Appendix 14 is amended as follows:
item 5.5 in the Table of Contents is replaced by the following:
in point 2, the third paragraph is replaced by the following:
‘In this scenario, the time available for communication is limited, because the Communication is targeted and of a short- range design. Further, the same communication means for remote tachograph monitoring (RTM) may also be used by the competent control authorities for other applications (such as the maximal weights and dimensions for heavy goods vehicles defined in Directive (EU) 2015/719) and such operations may be separate or sequential at the discretion of the competent control authorities.’;
point 5.1 is amended as follows:
in paragraph DSC_19, the twelfth dash is replaced by the following:
‘The DSRC-VU antenna shall be positioned at a location where it optimizes the DSRC communication between the vehicle and the roadside reader antenna, when the reader is installed 15 meters distance in front of the vehicle and 2 meters height, targeting the horizontal and vertical centre of the windscreen. For light vehicles an installation corresponding to the upper part of the windscreen is suitable. For all the other vehicles the DSRC antenna shall be installed either near the lower or near the upper part of the windscreen.’;
in paragraph DSC_22, the first sub-paragraph is replaced by the following:
‘The form factor of the antenna is not defined and shall be a commercial decision, so long as the fitted DSRC-VU meets the conformance requirements defined in section 5 below. The antenna shall be positioned as determined in DSC_19 and efficiently support the use cases described in in 4.1.2 and 4.1.3.’;
in point 5.4.3, sequence 7 is replaced by the following:
| ‘7 | REDCR | > | DSRC-VU | Sends GET.request for data of other Attribute (if appropriate)’ |
in point 5.4.4, the ASN.1 module definition in paragraph DCS_40 is amended as follows:
the following footnote 1 is added:
if a LPN contains an AlphabetIndicator LatinAlphabetNo2 or latinCyrillicAlphabet, the special characters are remapped at the road interrogator unit applying special rules according to Annex E of ISO/DIS 14 906,2’;
the superscript 2 is removed from the line where the Timestamp of current record is defined;
in point 5.4.5, item RTM12 in table 14.3 is replaced by the following:
in point 5.4.6, DSC_43 is replaced by the following:
in point 5.4.7, in the Fourth column of Table 14.9, the text in the cell describing is replaced by the following:
‘Object Identifier of the supported standard, part, and version. Example: ISO (1) Standard (0) TARV (15638) part9 (9) Version1 (1).
First octet is 06H, which is the Object Identifier. Second octet is 06H, which is its length. Subsequent 6 octets encode the example Object Identifier.’;
points 5.5 and 5.5.1 are replaced by the following:
in point 5.6.1, sub-paragraph (a) in paragraph DSC_68 is replaced by the following:
In order that different suppliers may be contracted to supply the VU and the DSRC-VU, and indeed different batches of DSRC-VU, the connection between the VU and the DSRC-VU not internal to the VU shall be an open standard connection. The VU shall connect with the DSRC-VU either’;
in point 5.7.1, paragraph DSC_77 is replaced by the following:
Appendix 15 is amended as follows:
the first paragraph of point 2.2 is replaced by the following:
‘It is understood that first generation tachograph cards are interoperable with first generation vehicle units in compliance with Annex IB to Regulation (EEC) No 3821/85, while second generation tachograph cards are interoperable with second generation vehicle units in compliance with Annex IC to this Regulation. In addition, the requirements below shall apply.’;
in point 2.4.1, paragraph MIG_11 is amended as follows:
the first indent is replaced by the following:
‘non signed EFs IC and ICC (optional),’;
the third indent is replaced by the following:
‘the other application data EFs (within DF Tachograph) requested by the first generation card download protocol. This information shall be secured with a digital signature, according to the first generation security mechanisms.
Such download shall not include application data EFs only present in second generation driver (and workshop) cards (application data EFs within DF Tachograph_G2).’;
In point 2.4.3, paragraphs MIG_014 and MIG_015 are replaced by the following:
Annex II to Regulation (EU) 2016/799 is amended as follows:
in Chapter I, paragraph b) in point 1 is replaced by the following:
an approval number corresponding to the number of the approval certificate drawn up for the prototype of the recording equipment or the record sheet or the tachograph card, placed at any point within the immediate proximity of that rectangle.’;
in Chapter III, point 5 is replaced by the following:
Submitted for approval on …’;
in Chapter IV, point 5 is replaced by the following:
Submitted for approval on …’.
Commission Implementing Regulation (EU) 2016/799 of 18 March 2016 implementing Regulation (EU) No 165/2014 of the European Parliament and of the Council laying down the requirements for the construction, testing, installation, operation and repair of tachographs and their components (OJ L 139, 26.5.2016, p. 1).
Directive 2014/53/EU of the European Parliament and of the Council of 16 April 2014 on the harmonisation of the laws of the Member States relating to the making available on the market of radio equipment and repealing Directive 1999/5/EC (OJ L 153, 22.5.2014, p. 62).
Council Regulation (EEC) No 3821/85 of 20 December 1985 on recording equipment in road transport (OJ L 370, 31.12.1985, p. 8).’;
Directive 2014/53/EU of the European Parliament and of the Council of 16 April 2014 on the harmonisation of the laws of the Member States relating to the making available on the market of radio equipment and repealing Directive 1999/5/EC (OJ L 153, 22.5.2014, p. 62).’;
The Whole Regulation you have selected contains over 200 provisions and might take some time to download. You may also experience some issues with your browser, such as an alert box that a script is taking a long time to run.
Would you like to continue?
Latest Available (revised):The latest available updated version of the legislation incorporating changes made by subsequent legislation and applied by our editorial team. Changes we have not yet applied to the text, can be found in the ‘Changes to Legislation’ area.
Original (As adopted by EU): The original version of the legislation as it stood when it was first adopted in the EU. No changes have been applied to the text.
Geographical Extent: Indicates the geographical area that this provision applies to. For further information see ‘Frequently Asked Questions’.
Show Timeline of Changes: See how this legislation has or could change over time. Turning this feature on will show extra navigation options to go to these specific points in time. Return to the latest available version by using the controls above in the What Version box.
Access essential accompanying documents and information for this legislation item from this tab. Dependent on the legislation item being viewed this may include:
This timeline shows the different versions taken from EUR-Lex before exit day and during the implementation period as well as any subsequent versions created after the implementation period as a result of changes made by UK legislation.
The dates for the EU versions are taken from the document dates on EUR-Lex and may not always coincide with when the changes came into force for the document.
For any versions created after the implementation period as a result of changes made by UK legislation the date will coincide with the earliest date on which the change (e.g an insertion, a repeal or a substitution) that was applied came into force. For further information see our guide to revised legislation on Understanding Legislation.
Use this menu to access essential accompanying documents and information for this legislation item. Dependent on the legislation item being viewed this may include:
Click 'View More' or select 'More Resources' tab for additional information including: