security credentials provisioning information Quintuple

Bidirectional?: False

security credentials provisioning information (A-Interconnect): This CVRIA application interconnect encapsulates all of the Layer 2 information flows between two application objects: 'CCMS Provisioning', and 'Center Trust Management'. This application interconnect is uni-directional since the underlying layer 2 information flows go from 'Cooperative ITS Credentials Management System' to 'Center'.

Cooperative ITS Credentials Management System (Source Physical Object): The 'Cooperative ITS Credentials Management System' (CCMS) is a high-level aggregate representation of the interconnected systems that enable trusted communications between mobile devices and other mobile devices, roadside devices, and centers and protect data they handle from unauthorized access. Representing the different interconnected systems that make up a Public Key Infrastructure (PKI), this physical object represents an end user view of the credentials management system with focus on the exchanges between the CCMS and user devices that support the secure distribution, use, and revocation of trust credentials.

CCMS Provisioning (Source Application Object): "CCMS Provisioning" components provide the end entity with material that allows it to enter the "Unenrolled" state. This consists of root certificates and the crypto material that allows it to communicate securely with the Enrollment components. This function ensures the requesting entity meets requirements for provisioning and provides the certificates and relevant policy information to entities that meet the requirements.

Center (Destination Physical Object): This general physical object is used to model core capabilities that are common to any center.

Center Trust Management (Destination Application Object): "Center Trust Management" manages the certificates and associated keys that are used to sign, encrypt, decrypt, and authenticate messages. It communicates with the Security and Credentials Management System to maintain a current, valid set of security certificates and identifies, logs, and reports events that may indicate a threat to the Connected Vehicle Environment security.