protected location and address flow Quintuple

Bidirectional?: False

protected location and address flow (A-Interconnect): This CVRIA application interconnect encapsulates all of the Layer 2 information flows between two application objects: 'PPG Privacy Services', and 'CCMS Authorization'. In this case, there is only a single Layer 2 flow associated with this interconnect, so the Layer 1 application interconnect name and the Layer 2 information flow name are both 'protected location and address flow'. This application interconnect is uni-directional since the underlying layer 2 information flows go from 'Privacy Protection Gateway' to 'Cooperative ITS Credentials Management System'.

Privacy Protection Gateway (Source Physical Object): The 'Privacy Protection Gateway' is a support system that obscures the network identifiers of mobile devices. A device may communicate to any center using the PPG.

PPG Privacy Services (Source Application Object): "PPG Privacy Services" operates as a proxy, replacing the mobile device's network address with the PPG's, and tagging the message so that it can return replies to the mobile device.

Cooperative ITS Credentials Management System (Destination Physical Object): The 'Cooperative ITS Credentials Management System' (CCMS) is a high-level aggregate representation of the interconnected systems that enable trusted communications between mobile devices and other mobile devices, roadside devices, and centers and protect data they handle from unauthorized access. Representing the different interconnected systems that make up a Public Key Infrastructure (PKI), this physical object represents an end user view of the credentials management system with focus on the exchanges between the CCMS and user devices that support the secure distribution, use, and revocation of trust credentials.

CCMS Authorization (Destination Application Object): "CCMS Authorization" components provide authorization credentials (e.g., pseudonym certificates) to end entities. The end entity applies for and obtains authorization credentials, enabling the end entity to enter the "Operational" state. This function requires an interactive dialog, including at minimum a Certificate Request from the end entity desiring certificates. This request will be checked for validity, with the embedded enrollment certificate checked against an internal blacklist. If all checks are passed, this function will distribute a bundle of linked pseudonym certificates suitable for use by the requesting end entity, with the characteristics and usage rules of those certificates dependent on the operational policies of the CCMS. It also provides the secure provisioning of a given object's Decryption Key in response to an authorized request from that object. The retrieved Decryption Key will be used by the receiving object to decrypt the "next valid" batch within the set of previously retrieved Security Credential batches.