HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (18 Oct 2025)

GB/T 45112-2024 English PDF

Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 45112-2024EnglishRFQ ASK 3 days [Need to translate] LTE-based vehicular communication - Technical requirement of security certificate management system Valid GB/T 45112-2024

PDF similar to GB/T 45112-2024


Standard similar to GB/T 45112-2024

YD/T 3710   YD/T 3709   YD/T 3708   GB/T 38634.5   GB/T 38624.3   

Basic data

Standard ID GB/T 45112-2024 (GB/T45112-2024)
Description (Translated English) LTE-based vehicular communication - Technical requirement of security certificate management system
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard M30
Classification of International Standard 33.060.99
Word Count Estimation 174,129
Date of Issue 2024-12-31
Date of Implementation 2025-04-01
Issuing agency(ies) State Administration for Market Regulation, China National Standardization Administration

GB/T 45112-2024: LTE-based vehicular communication - Technical requirement of security certificate management system


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 33.060.99 CCSM30 National Standard of the People's Republic of China Wireless communication technology for Internet of Vehicles based on LTE Technical requirements for security certificate management system Released on 2024-12-31 2025-04-01 Implementation State Administration for Market Regulation The National Standardization Administration issued

Table of Contents

Preface III 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 2 5 Overview 4 5.1 Composition of V2X communication safety system 4 5.2 V2X Communication Security Service Architecture 5 6 LTE-V2X Certificate Management Security Requirements 8 6.1 Overview 8 6.2 Confidentiality Requirements 8 6.3 Integrity Requirements 8 6.4 Authenticity Requirements 8 6.5 Privacy Protection Requirements 9 6.6 CA system security requirements 9 7 Overall technical requirements for LTE-V2X communication security authentication mechanism 9 7.1 LTE-V2X Certificate Management System Architecture 9 7.2 LTE-V2X Security Certificate 17 7.3 Basic elements description 24 7.4 Security Protocol Data Unit 24 7.5 Digital Certificate and Certificate Management Data Format 36 8 LTE-V2X communication security authentication interaction process and interface technical requirements 48 8.1 Registration Certificate Management Process 48 8.2 Pseudonym Certificate Application Process 54 8.3 Application Certificate and Identity Certificate Management Process 59 8.4 Certificate Revocation List Management Process 64 8.5 Organization Certificate Management Process 72 8.6 Abnormal Behavior Management 73 8.7 LA Management Structure and Process 73 9 LTE-V2X communication security authentication PKI mutual trust technical requirements 77 9.1 Overview 77 9.2 PKI mutual trust architecture 77 9.3 PKI mutual trust management process 79 9.4 PKI mutual trust authentication process 81 9.5 Trusted Root Certificate List Management Policy 81 9.6 Trusted Domain Certificate List Management Strategy 81 9.7 Abnormal Behavior Check in Trusted Domains 81 Appendix A (Informative) Basic Application Model of Internet of Vehicles Communication Security 82 Appendix B (Informative) Token Authorization Mechanism Based on OAUTH 84 Appendix C (Normative) ASN.1 Template 86 Appendix D (Normative) Input and Output of Cryptographic Algorithms 107 Appendix E (Normative) Data format for the interface between V2X devices and security certificate management system 111 Appendix F (Normative) GB A mechanism application layer session key generation and use method 147 Appendix G (Informative) Certificate Lifecycle and Update Scenarios 148 Appendix H (Informative) Proposed algorithm for key derivation process 150 Appendix I (Normative) Link Value Related Definitions 155 Appendix J (Normative) Trusted Certificate List and Mutual Trust Certification Process 157 Appendix K (Informative) Algorithm Coding Examples 161 References 169

Foreword

This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents" Drafting. Please note that some of the contents of this document may involve patents. The issuing organization of this document does not assume the responsibility for identifying patents. This document was proposed by the Ministry of Industry and Information Technology of the People's Republic of China. This document is under the jurisdiction of the National Communications Standardization Technical Committee (SAC/TC485). This document was drafted by. China Information and Communications Technology Group Co., Ltd., China Academy of Information and Communications Technology, China Mobile Communications Group Co., Ltd. China Automotive (Beijing) Intelligent Connected Vehicle Research Institute Co., Ltd., Huawei Technologies Co., Ltd., Qualcomm Wireless Communications Technologies (China) Ltd. Ltd., Neusoft Group Co., Ltd., Zhengzhou Xindajiean Information Technology Co., Ltd., Volkswagen (China) Investment Co., Ltd., BMW (China) Service Co., Ltd., General Motors (China) Investment Co., Ltd., Beijing Digital Certification Co., Ltd., Beijing Xinchangcheng Technology Development Shenzhen Aolian Information Security Technology Co., Ltd., Shanghai Automotive Group Co., Ltd., Beijing Qihoo Technology Co., Ltd., Tencent Cloud Computing (Beijing) Co., Ltd., Beijing Xin'an Century Technology Co., Ltd., Shanghai Weilai Automobile Co., Ltd., Chongqing Liangjiang Zhi Huicheng City Investment Development Co., Ltd. and Guoqi Zhiduan (Chengdu) Technology Co., Ltd. The main drafters of this document are. Xu Hui, Zhou Wei, Fang Ji, Ge Yuming, Tian Ye, Du Zhimin, Liang Chengzhi, Wu Zhiming, Liu Weihua, Liu Xianlun, Zheng Jun, Li Xiangfeng, Su Li, Yu Rundong, Liu Jianxing, Liu Shuai, Pan Kai, Ma Jianchao, Zheng Xuesong, Yang Guangyuan, Wen Boxue, Cheng Zhaohui, Zhang Lijia, Yang Xing, Yan Dong, Lei Yixue, Zhang Yongqiang, Wang Xinhua, Zhang Yi, Zhang Qingyong, Gao Ji, Liu Peng, Lu Weijin, Tai Chong, and Li Hongqiao. Wireless communication technology for Internet of Vehicles based on LTE Technical requirements for security certificate management system

1 Scope

This document specifies the architecture of the LTE-based Internet of Vehicles security certificate management system, certificate management requirements, security authentication mechanism requirements and related The explicit certificate format and interaction process related to it. This document applies to LTE-V2X devices and security certificate management systems.

2 Normative references

The contents of the following documents constitute the essential clauses of this document through normative references in this document. For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to This document. GB/T 16262 (all parts) Information technology Abstract syntax notation --- (ASN.1) GB/T 25056 Information security technology certificate authentication system password and related security technical specifications GB/T 25069 Information security technical terms GB/T 32905 Information security technology SM3 cryptographic hash algorithm GB/T 32907 Information security technology SM4 group key algorithm GB/T 32918.1-2016 Information security technology SM2 Elliptic curve public key cryptography algorithm Part 1.General GB/T 32918.2 Information Security Technology SM2 Elliptic Curve Public Key Cryptography Algorithm Part 2.Digital Signature Algorithm GB/T 32918.4 Information security technology SM2 Elliptic curve public key cryptography algorithm Part 4.Public key encryption algorithm GB/T 32918.5 Information Security Technology SM2 Elliptic Curve Public Key Cryptography Algorithm Part 5.Parameter Definition GB/T 36624 Information technology security technology identifiable encryption mechanism ISO /IEC 8825-7 Information technology Abstract Syntax Notation One (ASN.1) encoding rules Part 7.Octet encoding rules (OER)]

3 Terms and definitions

The terms and definitions defined in GB/T 25069 and the following apply to this document. 3.1 V2X equipment Safety equipment for vehicle-mounted units, roadside equipment and connected vehicle service providers. 3.2 A digital certificate related to V2X communication issued by a certificate authority to a connected vehicle device.