GB/T 20851 consists of the following five parts under the general title Electronic toll collection - Dedicated short range communication:
——Part 1: Physical layer;
——Part 2: Data link layer;
——Part 3: Application layer;
——Part 4: Equipment application;
——Part 5: Test methods of the main parameters in physical layer.
This is part 4 of GB/T 20851.
This part is developed in accordance with the rules given in GB/T 1.1-2009.
This part replaces GB/T 20851.4-2007 Electronic toll collection - Dedicated short range communication - Part 4: Equipment application. In addition to editorial changes, the following main technical changes have been made with respect to GB/T 20851.4-2007:
——some normative references are modified (see Clause 2; Clause 2 of Edition 2007);
——normative references for battery requirements and transportation safety are added (see Clause 2);
——some abbreviations are modified (see 3.2; 3.2 of Edition 2007);
——the requirement that ETC application is only limited to bi-chip type is modified (see 4.1; 4.1 of Edition 2007);
——the file types of OBE data structure are deleted (see Table 1 of Edition 2007);
——the codes of OBE keys are deleted (see Table 2 of Edition 2007);
——the codes of file attributes are deleted (see Table 3 of Edition 2007);
——the "unauthorized" in the file attribute is changed to "forbidden" (see Table 3; Table 3 of Edition 2007);
——the TDES security calculation algorithm is modified to SM4 algorithm (see 5.1.2; 5.1.2 of Edition 2007);
——the size of information storage space to be supported by OBE is modified (see 5.1.3; 5.1.3 of Edition 2007);
——the requirements for standard configuration components and optional configuration components to be supported by OBE are modified (see 5.1.4; 5.1.4 of Edition 2007);
——the security requirements for battery are added (see 5.1.8);
——the requirements for OBE environment conditions are modified (see 5.1.11; 5.1.10 of Edition 2007);
——the requirements for OBE electromagnetic compatibility are added (see 5.1.12);
——the suggestions on the installation position of OBE in the vehicle are added (see 5.1.13);
——the requirements for OBE wakeup sensitivity and adjustable function of equivalent isotropically radiated power are added (see 5.1.14);
——the requirement that RSE shall be equipped with built-in PSAM security authentication module as security access module or chip, board card or auxiliary equipment reaching the same security level is modified (see 5.2.3; 5.2.3 of Edition 2007);
——the requirements for RSE upper computer communication interface are modified (see 5.2.4; 5.2.4 of Edition 2007);
——the requirement that RSE shall be provided with network monitoring interface is added (see 5.2.4);
——the requirements for RSE power supply are modified (see 5.2.8; 5.2.8 of Edition 2007);
——the requirements for RSE environment conditions are modified (see 5.2.10; 5.2.10 of Edition 2007);
——the requirements for RSE electromagnetic compatibility are added (see 5.2.12);
——the requirements for adjustable function of equivalent isotropically radiated power of RSE are added (see 5.2.13);
——the OBE data structure and the type, reading attribute and writing attribute in attributes are deleted (see 6.1 of Edition 2007);
——the key codes of system key files are deleted (see Table 6 of Edition 2007);
——the tampered status in system information file is added (see 6.2.2);
——the key codes of ETC application key files are deleted (see Table 8 of Edition 2007);
——the requirements for ETC application reserved file are modified (see 6.3.4; 6.3.4 of Edition 2007);
——the identification station application file and urban road toll collection application file are deleted (see 6.3.5 and 6.3.6 of Edition 2007);
——the value range of the starting position of operating data in the request parameter requirements of the GetSecure service primitive and SetSecure service primitive are modified (see 7.2.2.1 and 7.3.2.1; 7.2.2.1 and 7.3.2.1 of Edition 2007);
——the functional requirements for SetSecure service primitive are modified (see 7.3.1; 7.3.1 of Edition 2007);
——the man-machine interaction indication identification in SetMMI is added (see 7.6.1);
——the key algorithm in ETC application security is modified, and TDES algorithm is changed to SM4 algorithm (see Clause 8; Clause 8 of Edition 2007);
——the requirements for ETC transaction process are added (see Clause 9);
——the expression of EtcVehicleFile vehicle license plate color in ASN.1 data structure by binary code, SetMMIRq data structure and SysInfoFile data of OBE are modified (see Annex A; Annex A of Edition 2007);
——the annex “Examples for transaction process of ETC application” is deleted (Annex B of Edition 2007);
——the definition of DSRC data frame for composite payment transaction application in ETC transaction process is added (see Annex B);
——the requirements for the data frame splicing multiple T-APDUs in the same LSDU are added (see Annex C).
This part was proposed by and is under the jurisdiction of the National Technical Committee on Intelligent Transportation Systems of Standardization Administration of China (SAC/TC 268).
The previous edition replaced by this part is as follows:
——GB/T 20851.4-2007.
Electronic toll collection - Dedicated short range communication - Part 4: Equipment application
1 Scope
This part of GB/T 20851 specifies the general principle of application, overall technical requirements of key equipment, OBE data structure, application interface, application security and transaction process of the dedicated short range communication equipment for electronic toll collection.
This part is applicable to electronic toll collection system for highways and urban roads, and may be used as a reference for fields of automated vehicle identification, vehicle access control system, etc.
2 Normative references
The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
GB/T 2312 Code of Chinese graphic character set for information interchange - Primary set
GB/T 2423.5-1995 Environmental testing for electric and electronic products - Part 2: Test methods - Test Ea and guidance: Shock
GB/T 2423.10-2008 Environmental testing for electric and electronic products - Part 2: Tests methods - Test Fc: Vibration (sinusoidal)
GB/T 2423.18-2012 Environmental testing - Part 2: Test methods - Test Kb: Salt mist, cyclic (sodium chloride solution)
GB/T 3482-2008 Lightning test method for electronic equipments
GB/T 4208-2017 Degrees of protection provided by enclosure (IP code)
GB/T 9254 Information technology equipment - Radio disturbance characteristics - Limits and methods of measurement
GB/T 17618 Information technology equipment - Immunity characteristics - Limits and methods of measurement
GB/T 17626.2 Electromagnetic compatibility - Testing and measurement techniques - Electrostatic discharge immunity test
GB/T 18655 Vehicles boats and internal combustion engines - Radio disturbance characteristics - Limits and methods of measurement for the protection of on-board receivers
GB/T 20135-2006 Intelligent transport systems - Electronic toll collection - System architecture
GB/T 20839-2007 Intelligent transport systems - General terminology
GB/T 20851.1-2019 Electronic toll collection - Dedicated short range communication - Part 1: Physical layer
GB/T 20851.2-2019 Electronic toll collection - Dedicated short range communication - Part 2: Data link layer
GB/T 20851.3-2019 Electronic toll collection - Dedicated short range communication - Part 3: Application layer
JR/T 0025.9-2010 China financial integrated circuit card specifications - Part 9: Electronic purse extended application guide
ISO/IEC 7816-1 Identification cards - Integrated circuit cards - Part 1: Cards with contacts - Physical characteristics
ISO/IEC 7816-2 Identification cards - Integrated circuit cards - Part 2: Cards with contacts - Dimensions and location of the contacts
ISO/IEC 7816-3 Identification cards - Integrated circuit cards - Part 3: Cards with contacts - Electrical interface and transmission protocols
ISO/IEC 7816-4 Identification cards - Integrated circuit cards - Part 4: Organization, security and commands for interchange
ISO/IEC 14443
(All parts) Identification cards - Contactless integrated circuit cards - Proximity cards
UL1642 Standard for safety lithium batteries
UN38.3 Recommendations on the transport of dangerous goods: Manual of tests and criteria
3 Terms, definitions and abbreviations
3.1 Terms and definitions
For the purposes of this document, the terms and definitions given in GB/T 20135-2006 and GB/T 20839-2007 apply.
3.2 Abbreviations
For the purposes of this document, the following abbreviations apply.
AVI: Automatic Vehicle Identification
DID: Directory Identifier
DSRC: Dedicated Short Range Communication
ETC: Electronic Toll Collection
FID: File Identifier
ICC: Integrate Circuit Card
MAC: Message Authentication Code
OBE: On Board Equipment
RSE: Roadside Equipment
UI: Unnumbered Information
4 General principle of application
4.1 Constitution of ETC system
A ETC system is composed of front end system, which contains lane control system, RSE, OBE and ICC, and backend database system.
OBE should be bi-chip type, supporting ICC reading/writing. For ETC application, ICC allows the functions involving electronic payment of bi-chip OBE while OBE provides a function of information transmission from ICC to RSE. See Figure 1 for the constitution of ETC system; wherein, the contents in the dotted box are those involved in this part.
Figure 1 Constitution of ETC system
See Figure 2 for the example of typical ETC transaction for bi-chip OBE.
Figure 2 Example of typical ETC transaction for bi-chip OBE
4.2 General provisions for OBE data
4.2.1 The data in OBE are organized into directories and files.
4.2.2 The directories in OBE are classified into system directory and application directory. The system directory is the root directory of OBE and is sole, while the application directory is a subdirectory under the root directory and may have multiple ones with one application corresponding to one directory. There are multiple files under each directory but there shall be no subdirectories under a subdirectory.
4.2.3 Files are classified into key file and application file: the key file stores the secret keys for controlling the security access of application data; the application file stores the application data.
4.2.4 The directories and files are identified respectively by DID and FID. The directory number DID ranges from 0x00 to 0x0F and that with DID of 0x00 is the root directory. The file number FID ranges from 0x00 to 0x7F and that with FID of 0x00 is the key file. The files under the root directory are system files and application files are stored in application directories. For ETC application, the directory number shall be 0x01.
4.2.5 See Table 1 for the structure of OBE data.
Table 1 Structure of OBE data
Directory/file ASN.1 data structure a
0x00
Root directory 0x00 system key file SysKeyFile
0x01 system information file SysInfoFile
... …
0x01 ETC application directory 0x00 ETC application key file EtcAppKeyFile
0x01 ETC application vehicle information file EtcAppVehicleFile
... …
... other application directories ... …
a See Annex A for ASN.1 data structure.
4.3 OBE key
Keys are classified into major governing key, maintenance key, authentication key and encryption key. The major governing keys are classified into system major governing key and application major governing key. The former is in the system key file and the latter is in the corresponding application key file. See Table 2 for the functions of keys.
Table 2 Functions of keys
Key type Key function Application process
Major governing key File creation enabled after passing authentication;
Security write-in by itself;
Security write-in of the other keys under the same directory;
The major governing key under the root directory is used for the write-in of the major governing key of subdirectory Release
Maintenance key Security-mode write-in of the files in the directory concerned Release
Authentication key Control of the authority to access, read and write the files in the directory concerned Transaction
Encryption key Encryption and decryption processing of data during transmission Transaction
4.4 File attribute
File access is key-controlled.
The deletion and creation of directories and files are carried out under the control of major governing keys.
Common files (non-key files) have four attributes, see Table 3.
Table 3 Attributes of files
Attribute Description
Free Free to read or write, no authentication or encryption processing required; transmission in plaintext data
Authentication Reading or writing enabled after passing authentication; transmission in plaintext data
Encryption The data contents under reading or writing are encrypted; transmission in ciphertext data
Forbidden Forbid the authority to read or write
4.5 Extended application interfaces
ETC equipment shall provide application interfaces that are extended on the basis of service primitive ACTION.
The service primitive shall meet the requirements of GB/T 20851.3-2019.
See Table 4 for the extended ETC application interfaces.
Table 4 Extended ETC application interfaces
Action type a Action name Description
0 GetSecure Read security files, and provide MAC and security encryption interfaces
1 SetSecure Write-in security files, and provide MAC and security encryption interfaces
2 GetRand Take random numbers for security purpose
3 TransferChannel Transfer channel to transfer APDU to OBE components
4 SetMMI Set man-machine interface, and specify the uniform instructions required for OBE
a The corresponding parameter of service primitive ACTION is ActionType.
5 General technical requirements of key equipment
5.1 General technical requirements of OBE
5.1.1 Wireless link communication
The DSRC between OBE and RSE shall comply with the relevant requirements of GB/T 20851.1-2019~GB/T 20851.3-2019.
5.1.2 Security
The OBE shall meet the following security requirements:
a) OBE shall provide a security access module to store access control keys and ETC application information, etc.
b) OBE shall support the data access and access control based on SM4 algorithm;
c) The write-in of all initialized data shall be transmitted by means of SM4 algorithm encryption.
d) OBE shall have an ICC read/write interface which shall comply with the relevant requirements of ISO/IEC 7816-1~ISO/IEC 7816-4 or ISO/IEC 14443 TYPE-A.
e) The ICC transaction process supported shall comply with 7.3 and 7.4, JR/T 0025.9-2010.
5.1.3 Information storage
Block data should be adopted for the storage of user information in OBE, and directory and files shall be adopted for its addressing.
The security access module in OBE shall be provided with at least 16k bytes of storage space.
5.1.4 Components
5.1.4.1 Standard configuration components
Bi-chip OBE shall be configured with ICC read/write module.
5.1.4.2 Optional configuration components
The optional configuration components for OBE include speaker, character display, red and green indicator lights, USB interface, RS232 serial port and Bluetooth module.
5.1.5 Tampering prevention and recovery
OBE shall be provided with a function against tampering. Once it is tampered, a flag byte/flag bit shall be accordingly set up in appropriate information storage area of OBE.
The ETC application, in case of failure due to tampering, shall be able to be recovered by software setting.
Foreword i
1 Scope
2 Normative references
3 Terms, definitions and abbreviations
4 General principle of application
5 General technical requirements of key equipment
6 OBE data structure
7 Interfaces of ETC application
8 Security of ETC application
9 ETC transaction process
Annex A (Normative) ASN.1 data structure of OBE
Annex B (Informative) DSRC data frame definition between RSE and OBE in composite payment transaction applications
Annex C (Informative) Example of multiple T-APDUs spliced in the same LSDU