Link Type: Wide-Area Wireless
Personal Information Device --> Center:
permission application
Definitions
permission application (Information Flow): A request for permission to access a Connected Vehicle service by an end-user that requires enrollment. This may include services granted to drivers of low emissions vehicles or pedestrians with special needs that require extended crossing times for example.
Personal Information Device (Source Physical Object): The 'Personal Information Device' provides the capability for travelers to receive formatted traveler information wherever they are. Capabilities include traveler information, trip planning, and route guidance. Frequently a smart phone, the Personal Information Device provides travelers with the capability to receive route planning and other personally focused transportation services from the infrastructure in the field, at home, at work, or while en-route. Personal Information Devices may operate independently or may be linked with connected vehicle on-board equipment.
Center (Destination Physical Object): This general physical object is used to model core capabilities that are common to any center.
Included In
This Information Flow is in the following Applications:
This Information Flow is in the following Application Objects:
Communication Diagrams
The communication diagram(s) can be viewed in SVG or PNG format and the current format is SVG. Switch to PNG format.
This profile describes applicable XML and W3C web services standards used in transmissions over wide area wireless communications.
This profile describes applicable ASN.1 standards used in transmissions over wide area wireless communications.
Characteristics
Architectural:
Characteristic | Value |
---|---|
Time Context | Recent |
Spatial Context | Regional |
Acknowledgement | True |
Cardinality | Unicast |
Initiator | Source |
Security
This information flow triple is in the following applications with the following security levels.
Information Flow Security | |||||
---|---|---|---|---|---|
Application | Confidentiality | Integrity | Availability | ||
Basis | Basis | Basis | |||
Security levels have not been defined yet. |