Commission Implementing Regulation (EU) 2018/502 of 28 February 2018 amending Implementing Regulation (EU) 2016/799 laying down the requirements for the construction, testing, installation, operation and repair of tachographs and their components (Text with EEA relevance)
Commission Implementing Regulation (EU) 2018/502of 28 February 2018amending Implementing Regulation (EU) 2016/799 laying down the requirements for the construction, testing, installation, operation and repair of tachographs and their components(Text with EEA relevance) THE EUROPEAN COMMISSION,Having regard to the Treaty on the Functioning of the European Union,Having regard to Regulation (EU) No 165/2014 of the European Parliament and of the Council of 4 February 2014 on tachographs in road transportOJ L 60, 28.2.2014, p. 1., and in particular Articles 11 and 12(7) thereof,Whereas:(1)Regulation (EU) No 165/2014 has introduced smart tachographs, second-generation digital tachographs which include a connection to the global navigation satellite system ("GNSS") facility, a remote early detection communication facility, and an optional interface with intelligent transport systems.(2)The technical requirements for the construction, testing, installation, operation and repair of tachographs and their components are set out in Commission Implementing Regulation (EU) 2016/799Commission Implementing Regulation (EU) 2016/799 of 18 March 2016 implementing Regulation (EU) No 165/2014 of the European Parliament and of the Council laying down the requirements for the construction, testing, installation, operation and repair of tachographs and their components (OJ L 139, 26.5.2016, p. 1)..(3)In accordance with Articles 8, 9 and 10 of Regulation (EU) No 165/2014, tachographs installed in vehicles registered for the first time on or after 15 June 2019 shall be smart tachographs. Implementing Regulation (EU) 2016/799 must therefore be amended so that the technical provisions laid down therein apply from that date.(4)In order to comply with Article 8 of Regulation (EU) No 165/2014, which establishes that the position of the vehicle must be recorded every 3 hours of accumulated driving time, Implementing Regulation (EU) 2016/799 should be amended to enable information on the position of the vehicle to be stored with a 3-hour frequency, using a metric that cannot be reset, and to avoid confusion with "continuous driving time", which is a metric with a different function.(5)The vehicle unit may be a single unit or several units distributed in the vehicle. The GNSS and the Dedicated Short Range Communication ("DSRC") facilities could therefore be internal or external to the vehicle unit main body. When they are external, it should be possible that both facilities and the main body of the vehicle unit can be type-approved as components, in order to adapt the smart tachograph type-approval process to the needs of the market.(6)The rules on the storage of time conflict events and time adjustments must be modified, in order to distinguish between the automatic time adjustments that are triggered following a possible tampering attempt or malfunctioning of the tachograph, and the time adjustments that are due to other reasons such as maintenance.(7)The data identifiers should be able to distinguish between data downloaded from a smart tachograph and data downloaded from a tachograph of a previous generation.(8)The validity period of the company card must be extended from 2 to 5 years, in order to align it with the validity period of the driver card.(9)The description of certain faults and events, the validation of the entries of places where daily work period begins and/or end, the use of the driver consent for Intelligent Transport System ("ITS") interface regarding data transmitted by the vehicle unit through the vehicle network and other technical issues should be better defined.(10)In order to ensure that the certification of tachograph seals is up to date, they need to be adjusted to the new standard on the security of the mechanical seals used on tachographs.(11)This Regulation concerns the construction, testing, installation and operation of systems which are also comprised of radio equipment regulated by Directive 2014/53/EU of the European Parliament and of the CouncilDirective 2014/53/EU of the European Parliament and of the Council of 16 April 2014 on the harmonisation of the laws of the Member States relating to the making available on the market of radio equipment and repealing Directive 1999/5/EC (OJ L 153, 22.5.2014, p. 62).. This Directive regulates the placement on the market and putting into service of electronic and electrical equipment using radio waves for communication and/or radiodetermination at a horizontal level, with particular respect to electrical safety, compatibility with other systems, access to radio spectrum, access to emergency services and/or any additional delegated provisions. In order to guarantee the efficient use of radio spectrum, to prevent harmful radio interferences, to ensure the safety and the electromagnetic compatibility of the radio equipment and to allow any other specific delegated requirements, this Regulation should be without prejudice to that Directive.(12)Implementing Regulation (EU) 2016/799 should therefore be amended.(13)The measures provided for in this Regulation are in accordance with the opinion of the Committee referred to in Article 42(3) of Regulation (EU) No 165/2014,HAS ADOPTED THIS REGULATION:
Article 1Implementing Regulation (EU) 2016/799 is amended as follows:(1)Article 1 is amended as follows:(a)the second and third paragraphs are replaced by the following:"2.The construction, testing, installation, inspection, operation and repair of smart tachographs and their components, shall comply with the technical requirements set out in Annex IC to this Regulation.3.Tachographs other than smart tachographs shall continue, as regards construction, testing, installation, inspection, operation and repair, to comply with the requirements of either Annex I to Regulation (EU) No 165/2014 or Annex IB to Council Regulation (EEC) No 3821/85Council Regulation (EEC) No 3821/85 of 20 December 1985 on recording equipment in road transport (OJ L 370, 31.12.1985, p. 8).";, as applicable;
----------------------
Council Regulation (EEC) No 3821/85 of 20 December 1985 on recording equipment in road transport (OJ L 370, 31.12.1985, p. 8).";
(b)the following paragraph 5 is added:"5.This Regulation shall be without prejudice to Directive 2014/53/EU of the European Parliament and of the CouncilDirective 2014/53/EU of the European Parliament and of the Council of 16 April 2014 on the harmonisation of the laws of the Member States relating to the making available on the market of radio equipment and repealing Directive 1999/5/EC (OJ L 153, 22.5.2014, p. 62).";.
----------------------
Directive 2014/53/EU of the European Parliament and of the Council of 16 April 2014 on the harmonisation of the laws of the Member States relating to the making available on the market of radio equipment and repealing Directive 1999/5/EC (OJ L 153, 22.5.2014, p. 62).";
(2)Article 2 is amended as follows:(a)definition (3) is replaced by the following:"(3)"information folder" means the complete folder, in electronic or paper form, containing all the information supplied by the manufacturer or its agent to the type-approval authority for the purpose of the type-approval of a tachograph or a component thereof, including the certificates referred to in Article 12(3) of Regulation (EU) No 165/2014, the performance of the tests defined in Annex IC to this Regulation, as well as drawings, photographs, and other relevant documents;";(b)definition (7) is replaced by the following:"(7)"smart tachograph" or "second generation tachograph" means a digital tachograph complying with Articles 8, 9 and 10 of Regulation (EU) No 165/2014 as well as with Annex IC to this Regulation;";(c)definition (8) is replaced by the following:"(8)"tachograph component" means any of the following elements: the vehicle unit, the motion sensor, the record sheet, the external GNSS facility and the external remote early detection facility;";(d)the following definition (10) is added:"(10)"vehicle unit" means the tachograph excluding the motion sensor and the cables connecting the motion sensor.It may be a single unit or several units distributed in the vehicle and includes a processing unit, a data memory, a time measurement function, two smart card interface devices for driver and co-driver, a printer, a display, connectors and facilities for entering the user’s inputs, a GNSS receiver and a remote communication facility.The vehicle unit may be composed of the following components subject to type-approval:vehicle unit, as a single component (including GNSS receiver and remote communication facility),vehicle unit main body (including remote communication facility), and external GNSS facility,vehicle unit main body (including GNSS receiver), and external remote communication facility,vehicle unit main body, external GNSS facility, and external remote communication facility.If the vehicle unit is composed of several units distributed in the vehicle, the vehicle unit main body is the unit containing the processing unit, the data memory, and the time measurement function."vehicle unit (VU)" is used for "vehicle unit" or "vehicle unit main body" ";(3)in Article 6, the third paragraph is replaced by the following:"However, Annex IC shall apply from 15 June 2019 with the exception of Appendix 16 which shall apply from 2 March 2016.";(4)Annex IC is amended in accordance with Annex I to this Regulation;(5)Annex II is amended in accordance with Annex II to this Regulation.
Article 2Entry into forceThis Regulation shall enter into force on the twentieth day following that of its publication in the Official Journal of the European Union.
This Regulation shall be binding in its entirety and directly applicable in all Member States.Done at Brussels, 28 February 2018.For the CommissionThe PresidentJean-Claude JunckerANNEX IAnnex IC to Regulation (EU) 2016/799 is amended as follows:(1)the Table of Contents is amended as follows:(a)point 3.12.5 is replaced by the following:"3.12.5.Places and positions where daily work periods begin, end and/or where 3 hours accumulated driving time is reached";(b)point 4.5.3.2.16 is replaced by the following:"4.5.3.2.16Three hours accumulated driving places data";(c)point 4.5.4.2.14 is replaced by the following:"4.5.4.2.14Three hours accumulated driving places data";(d)point 6.2 is replaced by the following:"6.2Check of new or repaired components";(2)point 1 is amended as follows:(a)definition (ll) is replaced by the following:"(ll)"remote communication facility" or "remote early detection facility" means:the equipment of the vehicle unit which is used to perform targeted roadside checks;";(b)definition (tt) is replaced by the following:"(tt)"time adjustment" means:an adjustment of current time; this adjustment can be automatic at regular intervals, using the time provided by the GNSS receiver as a reference, or performed in calibration mode;";(c)the first dash of definition (yy) is replaced by the following:"—installed and used only in M1 and N1 type vehicles (as defined in Annex II to Directive 2007/46/EC of the European Parliament and of the Council (*), as last amended),";(d)a new definition (fff) is added:"(fff)"accumulated driving time" means:a value representing the total accumulated number of minutes of driving of a particular vehicle.The accumulated driving time value is a free running count of all minutes regarded as DRIVING by the monitoring of driving activities function of the recording equipment, and is only used for triggering the recording of the vehicle position, every time a multiple of three hours of accumulated driving is reached. The accumulation is started at the recording equipment activation. It is not affected by any other condition, like out of scope or ferry/train crossing.The accumulated driving time value is not intended to be displayed, printed, or downloaded;";(3)in point 2.3, the last indent of paragraph (13) is replaced by the following:"—the vehicle units have a normal operations validity period of 15 years, starting with the vehicle unit certificates effective date, but vehicle units can be used for additional 3 months, for data downloading only.";(4)in point 2.4, the first paragraph is replaced by the following:"The system security aims at protecting the data memory in such a way as to prevent unauthorised access to and manipulation of the data and detecting any such attempts, protecting the integrity and authenticity of data exchanged between the motion sensor and the vehicle unit, protecting the integrity and authenticity of data exchanged between the recording equipment and the tachograph cards, protecting the integrity and authenticity of data exchanged between the vehicle unit and the external GNSS facility, if any, protecting the confidentiality, integrity and authenticity of data exchanged through the remote early detection communication for control purposes, and verifying the integrity and authenticity of data downloaded.";(5)in point 3.2, the second dash of paragraph (27) is replaced by the following:"—positions where the accumulated driving time reaches a multiple of three hours;";(6)in point 3.4, paragraph (49) is replaced by the following:"(49)The first change of activity to BREAK/REST or AVAILABILITY arising within 120 seconds of the automatic change to WORK due to the vehicle stop shall be assumed to have happened at the time of vehicle stop (therefore possibly cancelling the change to WORK).";(7)in point 3.6.1, paragraph (59) is replaced by the following:"(59)The driver shall then enter the current place of the vehicle, which shall be considered as a temporary entry.Under the following conditions temporary entry made at last card withdrawal is validated (i.e. shall not be overwritten anymore):entry of a place where the current daily work period begins during manual entry according to requirement (61);the next entry of a place where the current daily work period begins if the card holder doesn’t enter any place where the work period begins or ended during the manual entry according to requirement (61).Under the following conditions temporary entry made at last card withdrawal is overwritten and the new value is validated:the next entry of a place where the current daily work period ends if the card holder doesn’t enter any place where the work period begins or ended during the manual input according to requirement (61)";(8)in point 3.6.2, the sixth and seventh dashes are replaced by the following:"—a place where a previous daily work period ended, associated to the relevant time (thus overwriting and validating the entry made at the last card withdrawal),a place where the current daily work period begins, associated to the relevant time (thus validating a temporary entry made at last card withdrawal).";(9)point 3.9.15 is replaced by the following:"3.9.15"Time conflict" event(86)This event shall be triggered, while not in calibration mode, when the VU detects a discrepancy of more than 1 minute between the time of the vehicle unit’s time measurement function and the time originating from the GNSS receiver. This event is recorded together with the internal clock value of the vehicle unit and comes together with an automatic time adjustment. After a time conflict event has been triggered, the VU will not generate other time conflict events for the next 12 hours. This event shall not be triggered in cases where no valid GNSS signal was detectable by the GNSS receiver for 30 days or more.";(10)in point 3.9.17, the following dash is added:"—ITS interface fault (if applicable)";(11)point 3.10 is amended as follows:(i)the text before the table in paragraph (89) is replaced by the following:"The recording equipment shall detect faults through self-tests and built-in-tests, according to the following table:";(ii)The following row is added to the table:
"ITS interface (optional)Proper operation"
(12)the second dash of point 3.12 is replaced by the following:"—the average number of positions per day is defined as at least 6 positions where the daily work period begins, 6 positions when the accumulated driving time reaches a multiple of three hours, and 6 positions where the daily work period ends, so that "365 days" include at least 6570 positions,";(13)point 3.12.5 is amended as follows:(a)the heading and paragraph (108) are replaced by the following:"3.12.5.Places and positions where daily work periods begin, end and/or where 3 hours accumulated driving time is reached(108)The recording equipment shall record and store in its data memory:places and positions where the driver and/or co-driver begins his daily work period;positions where the accumulated driving time reaches a multiple of three hours;places and positions where the driver and/or the co-driver ends his daily work period.";(b)the fourth dash of paragraph (110) is replaced by the following:"—The type of entry (begin, end or 3 hours accumulated driving time),";(c)paragraph (111) is replaced by the following:"(111)The data memory shall be able to hold places and positions where daily work periods begin, end and/or where 3 hours accumulated driving time is reached for at least 365 days";(14)in point 3.12.7, paragraph (116) is replaced by the following:"(116)The recording equipment shall record and store in its data memory the instantaneous speed of the vehicle and the corresponding date and time at every second of at least the last 24 hours that the vehicle has been moving";(15)the table in point 3.12.8 is amended as follows:(a)the following item is inserted between the items "Absence of position information from GNSS receiver" and "Motion data error":
"Communication error with the external GNSS facilitythe longest event for each of the 10 last days of occurrence,the 5 longest events over the last 365 days.date and time of beginning of event,date and time of end of event,card(s) type, number, issuing Member State and generation of any card inserted at beginning and/or end of the event,number of similar events that day."
(b)The item "Time conflict" is replaced by the following:
"Time conflictthe most serious event for each of the 10 last days of occurrence (i.e. the ones with the greatest difference between recording equipment date and time, and GNSS date and time).the 5 most serious events over the last 365 days.recording equipment date and timeGNSS date and time,card(s) type, number, issuing Member State and generation of any card inserted at beginning and/or end of the event,number of similar events that day."
(16)in point 3.20 paragraph (200) is replaced by the following:"(200)The recording equipment may also be equipped with standardised interfaces allowing the data recorded or produced by tachograph to be used in operational or calibration mode, by an external facility.In Appendix 13, an optional ITS interface is specified and standardized. Other vehicle unit interfaces may co-exist, provided they fully comply with the requirements of Appendix 13 in term of minimum list of data, security and driver consent.The driver consent doesn’t apply to data transmitted by the recording equipment to the vehicle network. In case the personal data injected in the vehicle network are further processed outside the vehicle network, it is the responsibility of the vehicle manufacturer to have that personal data process compliant with Regulation (EU) 2016/679 ("General Data Protection Regulation").The driver consent doesn’t apply either to tachograph data downloaded to a remote company (requirement 193), as this scenario is monitored by the company card access right.The following requirements apply to ITS data made available through that interface:these data are a set of selected existing data from the tachograph data dictionary (Appendix 1),a subset of these selected data are marked "personal data",the subset of "personal data" is only available if the verifiable consent of the driver, accepting his personal data can leave the vehicle network, is enabled,At any moment, the driver consent can be enabled or disabled through commands in the menu, provided the driver card is inserted,the set and subset of data will be broadcasted via Bluetooth wireless protocol in the radius of the vehicle cab, with a refresh rate of 1 minute,the pairing of the external device with the ITS interface will be protected by a dedicated and random PIN of at least 4 digits, recorded in and available through the display of each vehicle unit,in any circumstances, the presence of the ITS interface cannot disturb or affect the correct functioning and the security of the vehicle unit.Other data may also be output in addition to the set of selected existing data, considered as the minimum list, provided they cannot be considered as personal data.The recording equipment shall have the capacity to communicate the driver consent status to other platforms in the vehicle network.When the ignition of the vehicle is ON, these data shall be permanently broadcasted.";(17)in point 3.23, paragraph (211) is replaced by the following:"(211)The time setting of the VU internal clock shall be automatically re-adjusted every 12 hours. When this re-adjustment is not possible because the GNSS signal is not available, the time setting shall be done as soon as the VU can access a valid time provided by GNSS receiver, according to the vehicle ignition conditions. The time reference for the automatic time setting of the VU internal clock shall be derived from the GNSS receiver.";(18)in point 3.26, paragraphs (225) and (226) are replaced by the following:"(225)A descriptive plaque shall be affixed to each separate component of the recording equipment and shall show the following details:name and address of the manufacturer,manufacturer's part number and year of manufacture,serial number,type-approval mark.(226)When physical space is not sufficient to show all above mentioned details, the descriptive plaque shall show at least: the manufacturer's name or logo and the part number.";(19)in point 4.1, the drawing corresponding to the front and reverse of the driver card is replaced by the following:"32018R0502_en_img_1 "(20)in point 4.5.3.1.8, the first dash in paragraph (263) is replaced by the following:"—Card fault (where this card is the subject of the fault),";(21)in point 4.5.3.2.8, the first dash in paragraph (288) is replaced by the following:"—Card fault (where this card is the subject of the fault),";(22)point 4.5.3.2.16 is replaced by the following:"4.5.3.2.16Three hours accumulated driving places data(305)The driver card shall be able to store the following data related to the position of the vehicle where the accumulated driving time reaches a multiple of three hours:the date and time when the accumulated driving time reaches a multiple of three hours,the position of the vehicle,the GNSS accuracy, date and time when the position was determined,the vehicle odometer value.(306)The driver card shall be able to store at least 252 such records.";(23)point 4.5.4.2.14 is replaced by the following:"4.5.4.2.14Three hours accumulated driving places data(353)The workshop card shall be able to store the following data related to the position of the vehicle where the accumulated driving time reaches a multiple of three hours:the date and time when the accumulated driving time reaches a multiple of three hours,the position of the vehicle,the GNSS accuracy, date and time when the position was determined,the vehicle odometer value.(354)The workshop card shall be able to store at least 18 such records";(24)in point 5.2, paragraph (396) is replaced by the following:"(396)The plaque shall bear at least the following details:name, address or trade name of the approved fitter or workshop,characteristic coefficient of the vehicle, in the form "w = … imp/km",constant of the recording equipment, in the form "k = … imp/km",effective circumference of the wheel tyres in the form "l = … mm",tyre size,the date on which the characteristic coefficient of the vehicle and the effective circumference of the wheel tyres were measured,the vehicle identification number,the presence (or not) of an external GNSS facility,the serial number of the external GNSS facility, if applicable,the serial number of the remote communication device, if any,the serial number of all the seals in place,the part of the vehicle where the adaptor, if any, is installed,the part of the vehicle where the motion sensor is installed, if not connected to the gear-box or an adaptor is not being used,a description of the colour of the cable between the adaptor and that part of the vehicle providing its incoming impulses,the serial number of the embedded motion sensor of the adaptor.";(25)point 5.3 is amended as follows:(a)a new paragraph (398a) is inserted after paragraph (398):"(398a)The seals mentioned above shall be certified according to the standard EN 16882:2016.";(b)in paragraph (401), the second sub-paragraph is replaced by the following:"This unique identification number is defined as: MMNNNNNNNN by non-removable marking, with MM as unique manufacturer identification (database registration to be managed by EC) and NNNNNNNN seal alpha-numeric number, unique in the manufacturer domain.";(c)paragraph (403) is replaced by the following:"(403)Seals manufacturers shall be registered in a dedicated database when they get a seal model certified according to EN 16882:2016 and shall make their identification seals numbers public through a procedure to be established by the European Commission.";(d)paragraph (404) is replaced by the following:"(404)Approved workshops and vehicle manufacturers shall, in the frame of Regulation (EU) No 165/2014, only use seals certified according to EN 16882:2016 from those of the seals manufacturers listed in the database mentioned above.";(26)point 6.2 is replaced by the following:"6.2.Check of new or repaired components(407)Every individual device, whether new or repaired, shall be checked in respect of its proper operation and the accuracy of its reading and recordings, within the limits laid down in Chapter 3.2.1, 3.2.2, 3.2.3 and 3.3";(27)in point 6.3, paragraph (408) is replaced by the following:"(408)When being fitted to a vehicle, the whole installation (including the recording equipment) shall comply with the provisions relating to maximum tolerances laid down in Chapter 3.2.1, 3.2.2, 3.2.3 and 3.3. The whole installation shall be sealed in accordance with Chapter 5.3 and it shall include a calibration.";(28)point 8.1 is amended as follows(a)in point 8.1, the introduction text before paragraph (425) is replaced by the following:"For the purpose of this chapter, the words "recording equipment" mean "recording equipment or its components". No type approval is required for the cable(s) linking the motion sensor to the VU, the external GNSS facility to the VU or the external remote communication facility to the VU. The paper, for use by the recording equipment, shall be considered as a component of the recording equipment.Any manufacturer may ask for type approval of recording equipment component(s) with any other recording equipment component(s), provided each component complies with the requirements of this annex. Alternately, manufacturers may also ask for type approval of recording equipment.As described in definition (10) in Article 2 of this Regulation, vehicle units have variants in components assembly. Whatever the vehicle unit components assembly, the external antenna and (if applicable) the antenna splitter connected to the GNSS receiver or to the remote communication facility are not part of the vehicle unit type approval.Nevertheless, manufacturers having obtained type approval for recording equipment shall maintain a publicly available list of compatible antennas and splitters with each type approved vehicle unit, external GNSS facility and external remote communication facility.";(b)paragraph (427) is replaced by the following:"(427)Member States type approval authorities will not grant a type approval certificate as long as they do not hold:a security certificate (if requested by this Annex),a functional certificate,and an interoperability certificate (if requested by this Annex)for the recording equipment or the tachograph card, subject of the request for type approval.";(29)Appendix 1 is amended as follows:(a)the Table of Content is amended as follows:(i)point 2.63 is replaced by the following:"2.63Reserved for future use";(ii)point 2.78 is replaced by the following:"2.78GNSSAccumulatedDriving";(iii)point 2.79 is replaced by the following:"2.79GNSSAccumulatedDrivingRecord";(iv)point 2.111 is replaced by the following:"2.111NoOfGNSSADRecords";(v)point 2.160 is replaced by the following:"2.160Reserved for future use";(vi)point 2.203 is replaced by the following:"2.203VuGNSSADRecord";(vii)point 2.204 is replaced by the following:"2.204VuGNSSADRecordArray";(viii)point 2.230 is replaced by the following:"2.230Reserved for future use";(ix)point 2.231 is replaced by the following:"2.231Reserved for future use";(b)in point 2, the following text is added before point 2.1:"For card data types used for Generation 1 and Generation 2 applications, the size specified in this Appendix is the one for Generation 2 application. The size for Generation 1 application is supposed to be already known by the reader. The Annex IC requirement numbers related to such data types cover both Generation 1 and Generation 2 applications.";(c)point 2.19 is replaced by the following:"2.19.CardEventDataGeneration 1:Information, stored in a driver or workshop card, related to the events associated with the card holder (Annex IC requirements 260 and 318).32018R0502_en_img_2CardEventData is a sequence, ordered by ascending value of EventFaultType, of cardEventRecords (except security breach attempts related records which are gathered in the last set of the sequence).cardEventRecords is a set of event records of a given event type (or category for security breach attempts events).Generation 2:Information, stored in a driver or workshop card, related to the events associated with the card holder (Annex IC requirements 285 and 341).32018R0502_en_img_3CardEventData is a sequence, ordered by ascending value of EventFaultType, of cardEventRecords (except security breach attempts related records which are gathered in the last set of the sequence).cardEventRecords is a set of event records of a given event type (or category for security breach attempts events)."(d)point 2.30 is replaced by the following:"2.30.CardRenewalIndexA card renewal index (definition i)).32018R0502_en_img_4Value assignment: (see this Annex chapter 7)."0"First issue.Order for increase: "0, …, 9, A, …, Z" ";(e)in point 2.61, the text after the heading Generation 2 is replaced by the following:"32018R0502_en_img_5In addition to generation 1 the following data elements are used:noOfGNSSADRecords is the number of GNSS accumulated driving records the card can store.noOfSpecificConditionRecords is the number of specific condition records the card can store.noOfCardVehicleUnitRecords is the number of vehicle units used records the card can store.";(f)point 2.63 is replaced by the following:"2.63.Reserved for future use";(g)in point 2.67, the text under the heading "Generation 2" is replaced by the following:"The same values as in generation 1 are used with the following additions:32018R0502_en_img_6Note 1:The generation 2 values for the Plaque, Adapter and the External GNSS connection as well as the generation 1 values for the Vehicle Unit and Motion Sensor may be used in SealRecord, i.e. if applicable.Note 2:In the CardHolderAuthorisation (CHA) field of a generation 2 certificate, the values (1), (2), and (6) are to be interpreted as indicating a certificate for Mutual Authentication for the respective equipment type. For indicating the respective certificate for creating a digital signature, the values (17), (18) or (19) must be used.";(h)in point 2.70, the text under the heading "Generation 2" is replaced by the following:"Generation 2:
32018R0502_en_img_7General events,No further details,Insertion of a non valid card,Card conflict,Time overlap,Driving without an appropriate card,Card insertion while driving,Last card session not correctly closed,Over speeding,Power supply interruption,Motion data error,Vehicle Motion Conflict,Time conflict (GNSS versus VU internal clock),Communication error with the remote communication facility,Absence of position information from GNSS receiver,Communication error with the external GNSS facility,RFU,
32018R0502_en_img_8Vehicle unit related security breach attempt events,No further details,Motion sensor authentication failure,Tachograph card authentication failure,Unauthorised change of motion sensor,Card data input integrity errorStored user data integrity error,Internal data transfer error,Unauthorised case opening,Hardware sabotage,Tamper detection of GNSS,External GNSS facility authentication failure,External GNSS facility certificate expired,RFU,
32018R0502_en_img_9Sensor related security breach attempt events,No further details,Authentication failure,Stored data integrity error,Internal data transfer error,Unauthorised case opening,Hardware sabotage,RFU,
32018R0502_en_img_10Recording equipment faults,No further details,VU internal fault,Printer fault,Display fault,Downloading fault,Sensor fault,Internal GNSS receiver,External GNSS facility,Remote communication facility,ITS interface,RFU,
32018R0502_en_img_11Card faults,No further details,RFU,
32018R0502_en_img_12RFU,
32018R0502_en_img_13Manufacturer specific.";
(i)Point 2.71 is replaced by the following:"2.71.ExtendedSealIdentifierGeneration 2:The extended seal identifier uniquely identifies a seal (Annex IC requirement 401).32018R0502_en_img_14manufacturerCode is a code of the manufacturer of the seal.sealIdentifier is an identifier for the seal which is unique for the manufacturer.";(j)points 2.78 and 2.79 are replaced by the following:"2.78GNSSAccumulatedDrivingGeneration 2:Information, stored in a driver or workshop card, related to the GNSS position of the vehicle if the accumulated driving time reaches a multiple of three hours (Annex IC requirement 306 and 354).32018R0502_en_img_15gnssADPointerNewestRecord is the index of the last updated GNSS accumulated driving record.Value assignment is the number corresponding to the numerator of the GNSS accumulated driving record, beginning with '0' for the first occurrence of the GNSS accumulated driving record in the structure.gnssAccumulatedDrivingRecords is the set of records containing the date and time the accumulated driving reaches a multiple of three hours and information on the position of the vehicle.2.79.GNSSAccumulatedDrivingRecordGeneration 2:Information, stored in a driver or workshop card, related to the GNSS position of the vehicle if the accumulated driving time reaches a multiple of three hours (Annex IC requirement 305 and 353)32018R0502_en_img_16timeStamp is the date and time when the accumulated driving time reaches a multiple of three hours.gnssPlaceRecord contains information related to the position of the vehicle.vehicleOdometerValue is the odometer value when the accumulated driving time reaches a multiple of three hours.";(k)point 2.86 is replaced by the following:"2.86.KeyIdentifierA unique identifier of a Public Key used to reference and select the key. It also identifies the holder of the key.32018R0502_en_img_17The first choice is suitable to reference the public key of a Vehicle Unit, of a tachograph card or of an external GNSS facility.The second choice is suitable to reference the public key of a Vehicle Unit (in cases where the serial number of the Vehicle Unit cannot be known at certificate generation time).The third choice is suitable to reference the public key of a Member State.";(l)point 2.92 is replaced by the following:"2.92.MACGeneration 2:A cryptographic check sum of 8, 12 or 16 bytes length corresponding to the cipher suites specified in Appendix 11.32018R0502_en_img_18 "(m)point 2.111 is replaced by the following:"2.111.NoOfGNSSADRecordsGeneration 2:Number of GNSS accumulated driving records a card can store.32018R0502_en_img_19Value assignment: see Appendix 2.";(n)in point 2.120, the value assignment "16H" is replaced by the following:"32018R0502_en_img_20 ";(o)point 2.160 is replaced by the following:"2.160.Reserved for future use";(p)point 2.162 is replaced by the following:"2.162.TimeRealCode for a combined date and time field, where the date and time are expressed as seconds past 00h.00m.00s. on 1 January 1970 UTC.32018R0502_en_img_21Value assignmentOctet aligned: Number of seconds since midnight 1 January 1970 UTC.The max. possible date/time is in the year 2106.";(q)point 2.179 is replaced by the following:"2.179VuCardRecordGeneration 2:Information, stored in a vehicle unit, about a tachograph card used (Annex IC requirement 132).32018R0502_en_img_22cardNumberAndGenerationInformation is the full card number and generation of the card used (data type 2.74).cardExtendedSerialNumber as read from the file EF_ICC under the MF of the card.cardStructureVersion as read from the file EF_Application_Identification under the DF_Tachograph_G2.cardNumber as read from the file EF_Identification under the DF_Tachograph_G2.";(r)points 2.203 and 2.204 are replaced by the following:"2.203VuGNSSADRecordGeneration 2:Information, stored in a vehicle unit, related to the GNSS position of the vehicle if the accumulated driving time reaches a multiple of three hours (Annex IC requirement 108, 110).32018R0502_en_img_23timeStamp is the date and time when the accumulated driving time reaches a multiple of three hours.cardNumberAndGenDriverSlot identifies the card including its generation which is inserted in the driver slot.cardNumberAndGenCodriverSlot identifies the card including its generation which is inserted in the co-driver slot.gnssPlaceRecord contains information related to the position of the vehicle.vehicleOdometerValue is the odometer value when the accumulated driving time reaches a multiple of three hours.2.204VuGNSSADRecordArrayGeneration 2:Information, stored in a vehicle unit, related to the GNSS position of the vehicle if the accumulated driving time reaches a multiple of three hours (Annex IC requirement 108 and 110).32018R0502_en_img_24recordType denotes the type of the record (VuGNSSADRecord).Value Assignment: See RecordType.recordSize is the size of the VuGNSSADRecord in bytes.noOfRecords is the number of records in the set records.records is a set of GNSS accumulated driving records.";(s)points 2.230 and 2.231 are replaced by the following:"2.230.Reserved for future use2.231.Reserved for future use";(t)in point 2.234, the text under the heading "Generation 2" is replaced by the following:"32018R0502_en_img_25In addition to generation 1 the following data elements are used:noOfGNSSADRecords is the number of GNSS accumulated driving records the card can store.noOfSpecificConditionRecords is the number of specific condition records the card can store.noOfCardVehicleUnitRecords is the number of vehicle units used records the card can store";
(30)Appendix 2 is amended as follows:(a)in point 1.1, the following abbreviations are added:"CHACertificate Holder AuthorisationDOData Object";(b)point 3.3 is amended as follows:(i)paragraph TCS_24 is replaced by the following:"TCS_24These security conditions can be linked in the following ways:ANDAll security conditions must be fulfilledORAt least one security condition must be fulfilledThe access rules for the file system, i.e. the SELECT, READ BINARY and UPDATE BINARY command, are specified in chapter 4. The access rules for the remaining commands are specified in the following tables. The term ‘not applicable’ is used if there is no requirement to support the command. In this case the command may or may not be supported, but the access condition is out of scope.";(ii)in paragraph TCS_25, the table is replaced by the following:
"CommandDriver CardWorkshop CardControl CardCompany Card
External Authenticate
For generation 1 authenticationALWALWALWALW
For generation 2 authenticationALWPWDALWALW
Internal AuthenticateALWPWDALWALW
General AuthenticateALWALWALWALW
Get ChallengeALWALWALWALW
MSE:SET ATALWALWALWALW
MSE:SET DSTALWALWALWALW
Process DSRC MessageNot applicableNot applicableNot applicableNot applicable
PSO: Compute Digital SignatureALW ORSM-MAC-G2ALW ORSM-MAC-G2Not applicableNot applicable
PSO: HashNot applicableNot applicableALWNot applicable
PERFORM HASH of FILEALW ORSM-MAC-G2ALW ORSM-MAC-G2Not applicableNot applicable
PSO: Verify CertificateALWALWALWALW
PSO: Verify Digital SignatureNot applicableNot applicableALWNot applicable
VerifyNot applicableALWNot applicableNot applicable"
(iii)in paragraph TCS_26, the table is replaced by the following:
"CommandDriver CardWorkshop CardControl CardCompany Card
External Authenticate
For generation 1 authenticationNot applicableNot applicableNot applicableNot applicable
For generation 2 authenticationALWPWDALWALW
Internal AuthenticateNot applicableNot applicableNot applicableNot applicable
General AuthenticateALWALWALWALW
Get ChallengeALWALWALWALW
MSE:SET ATALWALWALWALW
MSE:SET DSTALWALWALWALW
Process DSRC MessageNot applicableALWALWNot applicable
PSO: Compute Digital SignatureALW ORSM-MAC-G2ALW ORSM-MAC-G2Not applicableNot applicable
PSO: HashNot applicableNot applicableALWNot applicable
PERFORM HASH of FILEALW ORSM-MAC-G2ALW ORSM-MAC-G2Not applicableNot applicable
PSO: Verify CertificateALWALWALWALW
PSO: Verify Digital SignatureNot applicableNot applicableALWNot applicable
VerifyNot applicableALWNot applicableNot applicable"
(iv)in paragraph TCS_27, the table is replaced by the following:
"CommandDriver CardWorkshop CardControl CardCompany Card
External Authenticate
For generation 1 authenticationNot applicableNot applicableNot applicableNot applicable
For generation 2 authenticationALWPWDALWALW
Internal AuthenticateNot applicableNot applicableNot applicableNot applicable
General AuthenticateALWALWALWALW
Get ChallengeALWALWALWALW
MSE:SET ATALWALWALWALW
MSE:SET DSTALWALWALWALW
Process DSRC MessageNot applicableNot applicableNot applicableNot applicable
PSO: Compute Digital SignatureNot applicableNot applicableNot applicableNot applicable
PSO: HashNot applicableNot applicableNot applicableNot applicable
PERFORM HASH of FILENot applicableNot applicableNot applicableNot applicable
PSO: Verify CertificateALWALWALWALW
PSO: Verify Digital SignatureNot applicableNot applicableNot applicableNot applicable
VerifyNot applicableALWNot applicableNot applicable"
(c)in point 3.4, paragraph TCS_29 is replaced by the following:"TCS_29The status words SW1 SW2 are returned in any response message and denote the processing state of the command.
SW1SW2Meaning
9000Normal processing.
61XXNormal processing. XX = number of response bytes available.
6281Warning processing. Part of returned data may be corrupted
6300Authentication failed (Warning)
63CXWrong CHV (PIN). Remaining attempts counter provided by "X".
6400Execution error - State of non-volatile memory unchanged. Integrity error.
6500Execution error - State of non-volatile memory changed
6581Execution error - State of non-volatile memory changed – Memory failure
6688Security errorwrong cryptographic checksum (during Secure Messaging) orwrong certificate (during certificate verification) orwrong cryptogram (during external authentication) orwrong signature (during signature verification)
6700Wrong length (wrong Lc or Le)
6883Last command of the chain expected
6900Forbidden command (no response available in T=0)
6982Security status not satisfied.
6983Authentication method blocked.
6985Conditions of use not satisfied.
6986Command not allowed (no current EF).
6987Expected Secure Messaging Data Objects missing
6988Incorrect Secure Messaging Data Objects
6A80Incorrect parameters in data field
6A82File not found.
6A86Wrong parameters P1-P2.
6A88Referenced data not found.
6B00Wrong parameters (offset outside the EF).
6CXXWrong length, SW2 indicates the exact length. No data field is returned.
6D00Instruction code not supported or invalid.
6E00Class not supported.
6F00Other checking errors
Additional status words as defined in ISO/IEC 7816-4 can be returned, if their behaviour is not explicitly mentioned in this appendix.For example the following status words can be optionally returned:6881: Logical channel not supported6882: Secure messaging not supported";
(d)in point 3.5.1.1, the last indent in paragraph TCS_38 is replaced by the following:"—If the selected application is considered to be corrupted (integrity error is detected within the file attributes), the processing state returned is "6400" or "6500".";(e)in point 3.5.1.2, the last indent in paragraph TCS_41 is replaced by the following:"—If the selected file is considered to be corrupted (integrity error is detected within the file attributes), the processing state returned is "6400" or "6500".";(f)in point 3.5.2.1, the sixth indent in paragraph TCS_43 is replaced by the following:"—If an integrity error is detected within the file attributes, the card shall consider the file as corrupted and unrecoverable, the processing state returned is "6400" or "6500".";(g)point 3.5.2.1.1 is amended as follows:(i)in paragraph TCS_45, the table is replaced by the following:
"ByteLengthValueDescription
#11"81h"TPV: Tag for plain value data
#2L"NNh" or"81 NNh"LPV: length of returned data (=original Le).L is 2 bytes if LPV>127 bytes.
#(2+L) - #(1+L+NN)NN"XX..XXh"Plain Data value
#(2+L+NN)1"99h"Tag for Processing Status (SW1-SW2) – optional for generation 1 secure messaging
#(3+L+NN)1"02h"Length of Processing Status – optional for generation 1 secure messaging
#(4+L+NN) - #(5+L+NN)2"XX XXh"Processing Status of the unprotected response APDU – optional for generation 1 secure messaging
#(6+L+NN)1"8Eh"TCC: Tag for cryptographic checksum
#(7+L+NN)1"XXh"LCC: Length of following cryptographic checksum"04h" for Generation 1 secure messaging (see Appendix 11 Part A)"08h", "0Ch" or "10h" depending on AES key length for Generation 2 secure messaging (see Appendix 11 Part B)
#(8+L+NN)-#(7+M+L+NN)M"XX..XXh"Cryptographic checksum
SW2"XXXXh"Status Words (SW1,SW2)"
(ii)in paragraph TCS_46, the table is replaced by the following:
"ByteLengthValueDescription
#11"87h"TPI CG: Tag for encrypted data (cryptogram)
#2L"MMh" or"81 MMh"LPI CG: length of returned encrypted data (different of original Le of the command due to padding).L is 2 bytes if LPI CG > 127 bytes.
#(2+L)-#(1+L+MM)MM"01XX..XXh"Encrypted Data: Padding Indicator and cryptogram
#(2+L+MM)1"99h"Tag for Processing Status (SW1-SW2) – optional for generation 1 secure messaging
#(3+L+MM)1"02h"Length of Processing Status – optional for generation 1 secure messaging
#(4+L+MM) - #(5+L+MM)2"XX XXh"Processing Status of the unprotected response APDU – optional for generation 1 secure messaging
#(6+L+MM)1"8Eh"TCC: Tag for cryptographic checksum
#(7+L+MM)1"XXh"LCC: Length of following cryptographic checksum"04h" for Generation 1 secure messaging (see Appendix 11 Part A)"08h", "0Ch" or "10h" depending on AES key length for Generation 2 secure messaging (see Appendix 11 Part B)
#(8+L+MM)-#(7+N+L+MM)N"XX..XXh"Cryptographic checksum
SW2"XXXXh"Status Words (SW1,SW2)"
(h)in point 3.5.2.2, the sixth indent in paragraph TCS_50 is replaced by the following:"—If an integrity error is detected within the file attributes, the card shall consider the file as corrupted and unrecoverable, the processing state returned is "6400" or "6500".";(i)in point 3.5.2.3, paragraph TCS_52 is amended as follows:(i)the last row of the table is replaced by the following:
"Le1'XXh'As specified in ISO/IEC 7816-4"
(ii)the following sentence is added:"In case of T = 0 the card assumes the value Le = "00h" if no secure messaging is applied.In case of T = 1 the processing state returned is "6700" if Le="01h".";
(j)in point 3.5.2.3, the sixth indent in paragraph TCS_53 is replaced by the following:"—If an integrity error is detected within the file attributes, the card shall consider the file as corrupted and unrecoverable, the processing state returned is "6400" or "6500".";(k)in point 3.5.3.2, the sixth indent in paragraph TCS_63 is replaced by the following:"—If an integrity error is detected within the file attributes, the card shall consider the file as corrupted and unrecoverable, the processing state returned is "6400" or "6500".";(l)in point 3.5.5, paragraph TCS_72 is replaced by the following:"TCS_72The PIN entered by the user must be ASCII encoded and right padded with "FFh" bytes up to a length of 8 bytes by the IFD, see also the data type WorkshopCardPIN in Appendix 1.";(m)in point 3.5.8, paragraph TCS_95 is replaced by the following:"TCS_95If the INTERNAL AUTHENTICATE command is successful, the current generation 1 session key, if existing, is erased and no longer available. In order to have a new generation 1 session key available, the EXTERNAL AUTHENTICATE command for the generation 1 authentication mechanism must be successfully performed.Note:For generation 2 session keys see Appendix 11 CSM_193 and CSM_195. If generation 2 session keys are established and the tachograph card receives the plain INTERNAL AUTHENTICATE command APDU, it aborts the generation 2 secure messaging session and destroys the generation 2 session keys.";(n)in point 3.5.9, paragraph TCS_97 is replaced by the following:"TCS_97The command variant for the second generation VU-card mutual authentication can be performed in the MF, DF Tachograph and DF Tachograph_G2, see also TCS_34. If this generation 2 EXTERNAL AUTHENTICATE command is successful, the current generation 1 session key, if existing, is erased and no longer available.Note:For generation 2 session keys see Appendix 11 CSM_193 and CSM_195. If generation 2 session keys are established and the tachograph card receives the plain EXTERNAL AUTHENTICATE command APDU, it aborts the generation 2 secure messaging session and destroys the generation 2 session keys.";(o)in point 3.5.10, the following row is added to the table in paragraph TCS_101:
"5 + L + 11"00h"As specified in ISO/IEC 7816-4"
(p)in point 3.5.11.2.3, the following paragraphs are added in paragraph TCS_114:"—If the currentAuthenticatedTime of the card is later than the Expiration Date of the selected public key, the processing state returned is "6A88".Note:In the case of a MSE: SET AT for VU Authentication command, the referenced key is a VU_MA public key. The card shall set the VU_MA public key for use, if available in its memory, which matches the Certificate Holder Reference (CHR) given in the command data field (the card can identify VU_MA public keys by means of the certificate's CHA field). A card shall return "6A 88" to this command in case only the VU_Sign public key or no public key of the Vehicle Unit is available. See the definition of the CHA field in Appendix 11 and of data type equipmentType in Appendix 1.Similarly, in case an MSE: SET DST command referencing an EQT (i.e. a VU or a card) is sent to a control card, according to CSM_234 the referenced key is always an EQT_Sign key that has to be used for the verification of a digital signature. According to Figure 13 in Appendix 11, the control card will always have stored the relevant EQT_Sign public key. In some cases, the control card may have stored the corresponding EQT_MA public key. The control card shall always set the EQT_Sign public key for use when it receives an MSE: SET DST command.";(q)point 3.5.13 is amended as follows:(i)paragraph TCS_121 is replaced by the following:"TCS_121The temporarily stored hash of file value shall be deleted if a new hash of file value is computed by means of the PERFORM HASH of FILE command, if a DF is selected, and if the tachograph card is reset.";(ii)paragraph TCS_123 is replaced by the following:"TCS_123The Tachograph Generation 2 application shall support the SHA-2 algorithm (SHA-256, SHA-384 or SHA-512), specified by the cipher suite in Appendix 11 Part B for the card signature key Card_Sign.";(iii)the table in paragraph TCS_124 is replaced by the following:
"ByteLengthValueDescription
CLA1"80h"CLA
INS1"2Ah"Perform Security Operation
P11"90h"Tag: Hash
P21"00h"Algorithm implicitly knownFor the Tachograph Generation 1 application: SHA-1For the Tachograph Generation 2 application: SHA-2 algorithm (SHA-256, SHA-384 or SHA-512) defined by the cipher suite in Appendix 11 Part B for the card signature key Card_Sign"
(r)point 3.5.14 is amended as follows:the text below the heading and until paragraph TCS_126 is replaced by the following:'This command is used to compute the digital signature of previously computed hash code (see PERFORM HASH of FILE, §3.5.13).Only the driver card and the workshop card are required to support this command in the DF Tachograph and DF Tachograph_G2.Other types of tachograph cards may or may not implement this command. In case of the Generation 2 tachograph application, only the driver card and the workshop card have a generation 2 signature key, other cards are not able to successfully perform the command and terminate with a suitable error code.The command may or may not be accessible in the MF. If the command is not accessible in the MF, it shall terminate with a suitable error code.This command is compliant with ISO/IEC 7816-8. The use of this command is restricted regarding the related standard.';(s)point 3.5.15 is amended as follows:(i)the table in paragraph TCS_133 is replaced by the following:
"ByteLengthValueDescription
CLA1"00h"CLA
INS1"2Ah"Perform Security Operation
P11"00h"
P21"A8h"Tag: data field contains DOs relevant for verification
Lc1"XXh"Length Lc of the subsequent data field
#61"9Eh"Tag for Digital Signature
#7 or#7-#8L"NNh" or"81 NNh"Length of digital signature (L is 2 bytes if the digital signature is longer than 127 bytes):128 bytes coded in accordance with Appendix 11 Part A for Tachograph Generation 1 application.Depending on the selected curve for Tachograph Generation 2 application (see Appendix 11 Part B).
#(7+L)-#(6+L+NN)NN"XX..XXh"Digital signature content"
(ii)the following indent is added to paragraph TCS_134:"—If the selected public key (used to verify the digital signature) has a CHA.LSB (CertificateHolderAuthorisation.equipmentType) that is not suitable for the digital signature verification according to Appendix 11, the processing state returned is "6985".";
(t)point 3.5.16 is amended as follows:(i)in paragraph TCS_138, the following row is added to the table:
"5 + L + 11'00h'As specified in ISO/IEC 7816-4"
(ii)the following sub-paragraph is added to paragraph TCS_139:"—"6985" indicates that the 4-byte time stamp provided in the command data field is earlier than cardValidityBegin or later than cardExpiryDate.";
(u)point 4.2.2 is amended as follows:(i)in the data structure in paragraph TCS_154, the lines from DF Tachograph G2 to EF CardMA_Certificate, and the lines from EF GNSS_Places to the end of this paragraph are replaced by the following:"32018R0502_en_img_26 "(ii)in paragraph TCS_155, the item 32018R0502_en_img_27 of the table is replaced by the following:
"32018R0502_en_img_2832018R0502_en_img_29252336"
(v)in point 4.3.1, the text corresponding to the abbreviation SC4 in paragraph TCS_156 is replaced by the following:"SC4For the READ BINARY command with even INS byte:(SM-C-MAC-G1 AND SM-R-ENC-MAC-G1) OR(SM-C-MAC-G2 AND SM-R-ENC-MAC-G2)For the READ BINARY command with odd INS byte (if supported): NEV";(w)point 4.3.2 is amended as follows:(i)in the data structure in paragraph TCS_162, the lines from DF Tachograph G2 to EF CardMA_Certificate, the lines from EF Calibration to extendedSealIdentifier and the lines from EF GNSS_Places to vehicleOdometerValue are replaced by the following:"32018R0502_en_img_3032018R0502_en_img_31 "(ii)the item NoOfGNSSCDRecords of the table in paragraph TCS_163 is replaced by the following:
"32018R0502_en_img_3232018R0502_en_img_331824"
(31)in Appendix 3, point 2 is amended as follows:(a)the following line is inserted after the line with the pictograms "Location start of daily work period" and "Location end of daily work period":"32018R0502_en_img_34 Position after 3 hours accumulated driving time";(b)the pictogram combination "time adjustment (by workshop)", is replaced by the following:"32018R0502_en_img_35 Time conflict or time adjustment (by workshop)";(c)the following pictogram combinations are added to the Events list:"32018R0502_en_img_36 Absence of position information from GNSS receiver or Communication error with the external GNSS facility;32018R0502_en_img_37 Communication error with the remote communication facility ";(32)Appendix 4 is amended as follows:(a)point 2 is amended as follows:(i)block number 11.4 is replaced by the following:
"11.4Entry of place where a daily work period begins and/or ends
pi=location begin / end pictogram, time, country, regionlongitude of the recorded positionlatitude of the recorded positiontimestamp when position was determinedOdometerpihh:mm Cou Reglon ±DDDoMM.M’lat ± DDoMM.M’hh:mmx xxx xxx km"
(ii)block number 11.5 is replaced by the following:
"11.5Positions after 3 hours accumulated driving timepi=position after 3 hours accumulated driving
timelongitude of the recorded positionlatitude of the recorded positiontimestamp when position was determinedOdometer32018R0502_en_img_38 "
(b)in point 3.1, position 11.5 of the daily printout format is replaced by the following:
"11.5Positions after 3 hours accumulated driving time in chronological order"
(c)in point 3.2, the daily printout format is replaced by the following:
"1Date and time at which the document is printed
2Type of printout
3Card holder identification (for all cards inserted in VU + GEN)
4Vehicle identification (vehicle from which printout is taken)
5VU identification (VU from which printout is taken + GEN)
6Last calibration of this VU
7Last control on this tachograph
9Driver activities delimiter
10Driver slot delimiter (slot 1)
10aOut of scope condition in the beginning of this day
10.1 / 10.2 / 10.3 / 10.3a / 10.4Activities in chronological order (driver slot)
10Co-driver slot delimiter (slot 2)
10aOut of scope condition in the beginning of this day
10.1 / 10.2 / 10.3 / 10.3a / 10.4Activities in chronological order (co-driver slot)
11Daily summary delimiter
11.1Summary of periods without card in driver slot
11.4Places entered in chronological order
11.5Positions after 3 hours accumulated driving time in chronological order
11.7Activity totals
11.2Summary of periods without card in co-driver slot
11.4Places entered in chronological order
11.5Positions after 3 hours accumulated driving time in chronological order
11.8Activity totals
11.3Summary of activities for a driver both slots included
11.4Places entered by this driver in chronological order
11.5Positions after 3 hours accumulated driving time in chronological order
11.9Activity totals for this driver
13.1Events faults delimiter
13.4Event/Fault records (Last 5 events or faults stored or on-going in the VU)
22.1Control place
22.2Controller’s signature
22.3From time (space available for a driver without a card to indicate
22.4To time which periods are relevant to himself)
22.5Driver's signature"
(d)in point 3.7, paragraph PRT_014 is replaced by the following:"PRT_014The historic of inserted cards printout shall be in accordance with the following format:
1Date and time at which the document is printed
2Type of printout
3Card holder identifications (of all cards inserted in the VU)
23Most recent card inserted in the VU
23.1Inserted cards (up to 88 records)
12.3Faults delimiter"
(33)Appendix 7 is amended as follows:(a)point 1.1 is replaced by the following:"1.1.ScopeData may be downloaded to an ESM:from a Vehicle Unit by an Intelligent Dedicated Equipment (IDE) connected to the VU,from a tachograph card by an IDE fitted with a card interface device (IFD),from a tachograph card via a vehicle unit by an IDE connected to the VU.To give the possibility to verify the authenticity and integrity of downloaded data stored on an ESM, data is downloaded with a signature appended in accordance with Appendix 11 Common Security Mechanisms. The source equipment (VU or card) identification and its security certificates (Member state and equipment) are also downloaded. The verifier of the data must possess independently a trusted European public key.Data downloaded from a VU are signed using Appendix 11 Common Security Mechanisms Part B (Second-generation tachograph system), except when drivers' control is performed by a non EU control authority, using a first generation control card, in which case data are signed using Appendix 11 Common Security Mechanisms Part A (First-generation tachograph system), as requested by Appendix 15 Migration, requirement MIG_015.This Appendix specifies therefore two types of data downloads from the VU:Generation 2 type of VU data download, providing the generation 2 data structure, signed using Appendix 11 Common Security Mechanisms Part B,Generation 1 type of VU data download, providing the generation 1 data structure, signed using Appendix 11 Common Security Mechanisms Part A.Similarly, there are two types of data downloads from second generation driver cards inserted in a VU, as specified in paragraphs 3 and 4 of this Appendix.";(b)point 2.2.2 is amended as follows:(i)the table is replaced by the following:
"Message StructureMax 4 Bytes HeaderMax 255 Bytes Data1 Byte CheckSum
IDE -><- VUFMTTGTSRCLENSIDDS_ / TRTPDATACS
Start Communication Request81EEF081E0
Positive Response Start Communication80F0EE03C1EA, 8F9B
Start Diagnostic Session Request80EEF0021081F1
Positive Response Start Diagnostic80F0EE02508131
Link Control Service
Verify Baud Rate (stage 1)
9600 Bd80EEF0048701,01,01EC
19200 Bd80EEF0048701,01,02ED
38400 Bd80EEF0048701,01,03EE
57600 Bd80EEF0048701,01,04EF
115200 Bd80EEF0048701,01,05F0
Positive Response Verify Baud Rate80F0EE02C70128
Transition Baud Rate (stage 2)80EEF0038702,03ED
Request Upload80EEF00A3500,00,00, 00,00,FF,FF,FF,FF99
Positive Response Request Upload80F0EE037500,FFD5
Transfer Data Request
Overview80EEF0023601 or 2197
Activities80EEF0063602 or 22DateCS
Events & Faults80EEF0023603 or 23Date99
Detailed Speed80EEF0023604 or 24Date9A
Technical Data80EEF0023605 or 25Date9B
Card download80EEF0023606SlotCS
Positive Response Transfer Data80F0EELen76TREPDataCS
Request Transfer Exit80EEF0013796
Positive Response Request Transfer Exit80F0EE0177D6
Stop Communication Request80EEF00182E1
Positive Response Stop Communication80F0EE01C221
Acknowledge sub message80EEF0Len83DataCS
Negative responses
General reject80F0EE037FSid Req10CS
Service not supported80F0EE037FSid Req11CS
Sub function not supported80F0EE037FSid Req12CS
Incorrect Message Length80F0EE037FSid Req13CS
Conditions not correct or Request sequence error80F0EE037FSid Req22CS
Request out of range80F0EE037FSid Req31CS
Upload not accepted80F0EE037FSid Req50CS
Response pending80F0EE037FSid Req78CS
Data not available80F0EE037FSid ReqFACS"
(ii)the following indents are added to the Notes after the table:"—TRTP 21 to 25 are used for Generation 2 type of VU data download requests, TRTP 01 to 05 are used for Generation 1 type of VU data download requests, which can only be accepted by the VU in the frame of drivers' control performed by a non EU control authority, using a first generation control card,TRTP 11 to 19 and 31 to 39 are reserved for manufacturer specific download requests.";
(c)point 2.2.2.9 is amended as follows:(i)paragraph DDP_011 is replaced by the following:"DDP_011The Transfer Data Request is sent by the IDE to specify to the VU the type of data that are to be downloaded. A one byte Transfer Request Parameter (TRTP) indicates the type of transfer.There are six types of data transfer. For VU data download, two different TRTP values can be used for each transfer type:
Data transfer typeTRTP value for generation 1 type of VU data downloadTRTP value for generation 2 type of VU data download
Overview0121
Activities of a specified date0222
Events and faults0323
Detailed speed0424
Technical data0525
Data transfer typeTRTP value
Card download06"
(ii)paragraph DDP_054 is replaced by the following:"DDP_054It is mandatory for the IDE to request the overview data transfer (TRTP 01 or 21) during a download session as this only will ensure that the VU certificates are recorded within the downloaded file (and allow for verification of digital signature).In the second case (TRTP 02 or 22) the Transfer Data Request message includes the indication of the calendar day ( 32018R0502_en_img_39 format) to be downloaded.";
(d)in point 2.2.2.10, paragraph DDP_055 is replaced by the following:"DDP_055In the first case (TREP 01 or 21), the VU will send data helping the IDE operator to choose the data he wants to download further. The information contained within this message is:Security certificates,Vehicle identification,VU current date and time,Min and Max downloadable date (VU data),Indication of cards presence in the VU,Previous download to a company,Company locks,Previous controls.";(e)in point 2.2.2.16, the last dash in paragraph DDP_018 is replaced by the following:"—FA data not availableThe data object of a data transfer request are not available in the VU (e.g. no card is inserted, generation 1 type of VU data download requested outside the frame of a driver’s control by a non EU control authority…).";(f)point 2.2.6.1 is amended as follows:(i)the first sub-paragraph in paragraph DDP_029 is replaced by the following:"The data field of the "Positive Response Transfer Data Overview" message shall provide the following data in the following order under the SID 76 Hex, the TREP 01 or 21 Hex and appropriate sub message splitting and counting:";(ii)the heading "Data structure generation 1" is replaced by the following:"Data structure generation 1 (TREP 01 Hex)";(iii)the heading "Data structure generation 2" is replaced by the following:"Data structure generation 2 (TREP 21 Hex)";(g)point 2.2.6.2 is amended as follows:(i)the first sub-paragraph in paragraph DDP_030 is replaced by the following:"The data field of the "Positive Response Transfer Data Activities" message shall provide the following data in the following order under the SID 76 Hex, the TREP 02 or 22 Hex and appropriate sub message splitting and counting:";(ii)the heading "Data structure generation 1" is replaced by the following:"Data structure generation 1 (TREP 02 Hex)";(iii)the heading "Data structure generation 2" is replaced by the following:"Data structure generation 2 (TREP 22 Hex)";(iv)the item VuGNSSCDRecordArray under the heading "Data structure generation 2 (TREP 22 Hex)", is replaced by the following:
"32018R0502_en_img_40GNSS positions of the vehicle when the accumulated driving time of the vehicle reaches a multiple of three hours. If the section is empty, an array header with noOfRecords = 0 is sent."
(h)point 2.2.6.3 is amended as follows:(i)the first sub-paragraph in paragraph DDP_031 is replaced by the following:"The data field of the "Positive Response Transfer Data Events and Faults" message shall provide the following data in the following order under the SID 76 Hex, the TREP 03 or 23 Hex and appropriate sub message splitting and counting:";(ii)the heading "Data structure generation 1" is replaced by the following:"Data structure generation 1 (TREP 03 Hex)";(iii)the heading "Data structure generation 2" is replaced by the following:"Data structure generation 2 (TREP 23 Hex)";(iv)the item VuTimeAdjustmentGNSSRecordArray under the heading "Data structure generation 2 (TREP 23 Hex)" is deleted;(i)point 2.2.6.4 is amended as follows:(i)the first sub-paragraph in paragraph DDP_032 is replaced by the following:"The data field of the "Positive Response Transfer Data Detailed Speed" message shall provide the following data in the following order under the SID 76 Hex, the TREP 04 or 24 Hex and appropriate sub message splitting and counting:";(ii)the heading "Data structure generation 1" is replaced by the following:"Data structure generation 1 (TREP 04)";(iii)the heading "Data structure generation 2" is replaced by the following:"Data structure generation 2 (TREP 24)";(j)point 2.2.6.5 is amended as follows:(i)the first sub-paragraph in paragraph DDP_033 is replaced by the following:"The data field of the "Positive Response Transfer Data Technical Data" message shall provide the following data in the following order under the SID 76 Hex, the TREP 05 or 25 Hex and appropriate sub message splitting and counting:";(ii)the heading "Data structure generation 1" is replaced by the following:"Data structure generation 1 (TREP 05)";(iii)the heading "Data structure generation 2" is replaced by the following:"Data structure generation 2 (TREP 25)";(k)in point 3.3, paragraph DDP_035 is replaced by the following:"DDP_035The download of a tachograph card includes the following steps:Download the common information of the card in the EFs 32018R0502_en_img_41 and 32018R0502_en_img_42 This information is optional and is not secured with a digital signature.(for first and second generation tachograph cards) Download EFs within 32018R0502_en_img_43 :Download the EFs 32018R0502_en_img_44 and 32018R0502_en_img_45 This information is not secured with a digital signature.It is mandatory to download these files for each download session.Download the other application data EFs (within 32018R0502_en_img_46 ) except EF 32018R0502_en_img_47 . This information is secured with a digital signature, using Appendix 11 Common Security Mechanisms Part A.It is mandatory to download at least the EFs 32018R0502_en_img_48 and 32018R0502_en_img_49 for each download session.When downloading a driver card it is also mandatory to download the following EFs:32018R0502_en_img_5032018R0502_en_img_51(for second generation tacograph cards only) Except when a download of a driver card inserted in a VU is performed during drivers' control by a non EU control authority, using a first generation control card, download EFs within 32018R0502_en_img_52 :Download the EFs CardSignCertificate, CA_Certificate and Link_Certificate (if present). This information is not secured with a digital signature.It is mandatory to download these files for each download session.Download the other application data EFs (within 32018R0502_en_img_53 ) except EF 32018R0502_en_img_54 . This information is secured with a digital signature, using Appendix 11 Common Security Mechanisms Part B.It is mandatory to download at least the EFs 32018R0502_en_img_55 and 32018R0502_en_img_56 for each download session.When downloading a driver card it is also mandatory to download the following EFs:32018R0502_en_img_57When downloading a driver card, update the 32018R0502_en_img_58 date in EF 32018R0502_en_img_59 , in the 32018R0502_en_img_60 and, if applicable, 32018R0502_en_img_61 DFs.When downloading a workshop card, reset the calibration counter in EF 32018R0502_en_img_62 in the 32018R0502_en_img_63 and, if applicable, 32018R0502_en_img_64 DFs.When downloading a workshop card the EF 32018R0502_en_img_65 in the 32018R0502_en_img_66 and, if applicable, 32018R0502_en_img_67 DFs shall not be downloaded.";(l)in point 3.3.2, the first subparagraph in paragraph DDP_037 is replaced by the following:"The sequence to download EFs ICC, IC, Card_Certificate (or CardSignCertificate for DF Tachograph_G2), CA_Certificate and Link_Certificate (for DF Tachograph_G2 only) is as follows:";(m)in point 3.3.3, the table is replaced by the following:
"CardDirIDE / IFDMeaning / Remarks
32018R0502_en_img_68Select File
OK32018R0502_en_img_69
32018R0502_en_img_70Perform Hash of FileCalculates the hash value over the data content of the selected file using the prescribed hash algorithm in accordance with Appendix 11, part A or B. This command is not an ISO-Command.
Calculate Hash of File and store Hash value temporarily
OK32018R0502_en_img_71
32018R0502_en_img_72Read BinaryIf the file contains more data than the buffer of the reader or the card can hold, the command has to be repeated until the complete file is read.
File DataOK32018R0502_en_img_73Store received data to ESMaccording to 3.4 Data storage format
32018R0502_en_img_74PSO: Compute Digital Signature
Perform Security Operation "Compute Digital Signature" using the temporarily stored Hash value
SignatureOK32018R0502_en_img_75Append data to the previous stored data on the ESMaccording to 3.4 Data storage format"
(n)in point 3.4.2, paragraph DDP_046 is replaced by the following:"DDP_046A signature shall be stored as the next TLV object directly after the TLV object that contains the data of the file.
DefinitionMeaningLength
FID (2 Bytes) || "00"Tag for EF (FID) in the 32018R0502_en_img_76 or for common information of the card3 Bytes
FID (2 Bytes) || "01"Tag for Signature of EF (FID) in the 32018R0502_en_img_77 DF3 Bytes
FID (2 Bytes) || "02"Tag for EF (FID) in the 32018R0502_en_img_78 DF3 Bytes
FID (2 Bytes) || "03"Tag for Signature of EF (FID) in the 32018R0502_en_img_79 DF3 Bytes
xx xxLength of Value field2 Bytes
Example of data in a download file on an ESM:
TagLengthValue
32018R0502_en_img_8032018R0502_en_img_81Data of EF ICC
32018R0502_en_img_8232018R0502_en_img_83Data of EF Card_Certificate
32018R0502_en_img_8432018R0502_en_img_85Data of EF 32018R0502_en_img_86 (in the 32018R0502_en_img_87 DF)
32018R0502_en_img_8832018R0502_en_img_89Signature of EF 32018R0502_en_img_90 (in the 32018R0502_en_img_91 DF)
32018R0502_en_img_9232018R0502_en_img_93Data of EF 32018R0502_en_img_94 in the 32018R0502_en_img_95 DF
32018R0502_en_img_9632018R0502_en_img_97Signature of EF 32018R0502_en_img_98 in the 32018R0502_en_img_99 DF"
(o)in point 4, paragraph DDP_049 is replaced by the following:"DDP_049First generation driver cards: Data shall be downloaded using the first generation data download protocol, and downloaded data shall have the same format as data downloaded from a first generation vehicle unit.Second generation driver cards: the VU shall then download the whole card, file by file, in accordance with the card downloading protocol defined in paragraph 3, and forward all data received from the card to the IDE within the appropriate TLV file format (see 3.4.2) and encapsulated within a "Positive Response Transfer Data" message.";
(34)in point 2 of Appendix 8, the paragraph under the heading "references" is replaced by the following:"ISO 14230-2: Road Vehicles -Diagnostic Systems — Keyword Protocol 2000- Part 2: Data Link Layer.First edition: 1999.";(35)Appendix 9 is amended as follows:(a)in the Table of Contents, point 6 is replaced by the following:"6.EXTERNAL REMOTE COMMUNICATION FACILITY TESTS";(b)in point 1.1, the first dash is replaced by the following:"—a security certification, based on Common Criteria specifications, against a security target fully compliant with Appendix 10 to this Annex,";(c)in point 2, the table of the vehicle unit functional tests is replaced by the following:
"NoTestDescriptionRelated requirements
1Administrative examination
1.1DocumentationCorrectness of documentation
1.2Manufacturer test resultsResults of manufacturer test performed during integration.Paper demonstrations.88, 89,91
2Visual inspection
2,1Compliance with documentation
2.2Identification / markings224 to 226
2.3Materials219 to 223
2.4Sealing398, 401 to 405
2.5External interfaces
3Functional tests
3.1Functions provided02, 03, 04, 05, 07, 382
3.2Modes of operation09 to 11*, 134, 135
3.3Functions and data access rights12* 13*, 382, 383, 386 to 389
3.4Monitoring cards insertion and withdrawal15, 16, 17, 18, 19*, 20*, 134
3.5Speed and distance measurement21 to 31
3.6Time measurement (test performed at 20 °C)38 to 43
3.7Monitoring driver activities44 to 53, 134
3.8Monitoring driving status54, 55, 134
3.9Manual entries56 to 62
3.10Company locks management63 to 68
3.11Monitoring control activities69, 70
3.12Detection of events and/or faults71 to 88, 134
3.13Equipment identification data93*, 94*, 97, 100
3.14Driver card insertion and withdrawal data102* to 104*
3.15Driver activity data105* to 107*
3.16Places and positions data108* to 112*
3.17Odometer data113* to 115*
3.18Detailed speed data116*
3.19Events data117*
3.20Faults data118*
3.21Calibration data119* to 121*
3.22Time adjustment data124*, 125*
3.23Control activity data126*, 127*
3.24Company locks data128*
3.25Download activity data129*
3.26Specific conditions data130*, 131*
3.27Recording and storing on tachographs cards136, 137, 138*, 139*, 141*, 142, 143144, 145, 146*, 147*, 148*, 149, 150
3.28Displaying90, 134,151 to 168,PIC_001, DIS_001
3.29Printing90, 134,169 to 181, PIC_001, PRT_001 to PRT_014
3.30Warning134, 182 to 191,PIC_001
3.31Data downloading to external media90, 134, 192 to 196
3.32Remote communication for targeted roadside checks197 to 199
3.33Output data to additional external devices200, 201
3.34Calibration202 to 206*, 383, 384, 386 to 391
3.35Roadside calibration checking207 to 209
3.36Time adjustment210 to 212*
3.37Non-interference of additional functions06, 425
3.38Motion sensor interface02, 122
3.39External GNSS facility03, 123
3.40Verify that the VU detects, records and stores the event(s) and/or fault(s) defined by the VU manufacturer when a paired motion sensor reacts to magnetic fields disturbing vehicle motion detection.217
3.41Cypher suite and standardized domain parametersCSM_48, CSM_50
4Environmental tests
4.1TemperatureVerify functionality through:Test according to ISO 16750-4, Chapter 5.1.1.2: Low temperature operation test (72 h @ – 20 °C)This test refers to IEC 60068-2-1: Environmental testing - Part 2-1: Tests - Test A: ColdTest according to ISO 16750-4: Chapter 5.1.2.2: High temperature operation test (72 h at 70 °C)This test refers to IEC 60068-2-2: Basic environmental testing procedures; part 2: tests; tests B: dry heatTest according to ISO 16750-4: Chapter 5.3.2: Rapid change of temperature with specified transition duration (– 20 °C/70 °C, 20 cycles, dwell time 2h at each temperature)A reduced set of tests (among those defined in section 3 of this table) can be carried out at the lower temperature, the higher temperature and during the temperature cycles213
4.2HumidityVerify that the vehicle unit can withstand a cyclic damp (heat test) through IEC 60068-2-30, test Db, six 24 hours cycles, each temperature varying from +25 °C to + 55 °C and a relative humidity of 97 % at + 25 °C and equal to 93 % at +55 °C214
4.3Mechanical1.Sinusoidal vibrations.verify that the vehicle unit can withstand sinusoidal vibrations with the following characteristics:constant displacement between 5 and 11 Hz: 10mm peakconstant acceleration between 11 and 300 Hz: 5gThis requirement is verified through IEC 60068-2-6, test Fc, with a minimum test duration of 3 × 12 hours (12 hours per axis)ISO 16750-3 does not require a sinusoidal vibration test for devices located in the decoupled vehicle cab.2.Random vibrations:Test according to ISO 16750-3: Chapter 4.1.2.8: Test VIII: Commercial vehicle, decoupled vehicle cabRandom vibration test, 10…2000 Hz, RMS vertical 21,3 m/s2, RMS longitudinal 11,8 m/s2, RMS lateral 13,1 m/s2, 3 axes, 32 h per axis, including temperature cycle – 20…70 °C.This test refers to IEC 60068-2-64: Environmental testing - Part 2-64: Tests - Test Fh: Vibration, broadband random and guidance3.Shocks:mechanical shock with 3 g half sinus according ISO 16750.The tests described above are performed on different samples of the equipment type being tested.219
4.4Protection against water and foreign bodiesTest according to ISO 20653: Road vehicles – Degree of protection (IP code) – Protection of electrical equipment against foreign objects, water and access (No change in parameters); Minimum value IP 40220, 221
4.5Over-voltage protectionVerify that the vehicle unit can withstand a power supply of:24 V versions34V at + 40 °C 1 hour12V versions17V at + 40 °C 1 hour(ISO 16750-2)216
4.6Reverse polarity protectionVerify that the vehicle unit can withstand an inversion of its power supply(ISO 16750-2)216
4.7Short-circuit protectionVerify that input output signals are protected against short circuits to power supply and ground(ISO 16750-2)216
5EMC tests
5.1Radiated emissions and susceptibilityCompliance with Regulation ECE R10218
5.2Electrostatic dischargeCompliance with ISO 10605:2008 +Technical Corrigendum:2010 +AMD1:2014: +/– 4 kV for contact and +/– 8 kV for air discharge218
5.3Conducted transient susceptibility on power supplyFor 24V versions: compliance with ISO 7637-2 + ECE Regulation No. 10 Rev. 3:pulse 1a: Vs=450V Ri=50 ohmspulse 2a: Vs=+37V Ri=2 ohmspulse 2b: Vs=+20V Ri=0,05 ohmspulse 3a: Vs=– 150V Ri=50 ohmspulse 3b: Vs=+150V Ri=50 ohmspulse 4: Vs=– 16V Va=– 12V t6=100mspulse 5: Vs=+120V Ri=2,2 ohms td=250msFor 12V versions: compliance with ISO 7637– 1 + ECE Regulation No. 10 Rev. 3:pulse 1: Vs=– 75V Ri=10 ohmspulse 2a: Vs=+37V Ri=2 ohmspulse 2b: Vs=+10V Ri=0,05 ohmspulse 3a: Vs=– 112V Ri=50 ohmspulse 3b: Vs=+75V Ri=50 ohmspulse 4: Vs=– 6V Va=– 5V t6=15mspulse 5: Vs=+65V Ri=3ohms td=100msPulse 5 shall be tested only for vehicle units designed to be installed in vehicles for which no external common protection against load dump is implementedFor load dump proposal, refer to ISO 16750-2, 4th edition, chapter 4.6.4.218"
(d)point 6 is replaced by the following:"6.EXTERNAL REMOTE COMMUNICATION FACILITY TEST
NoTestDescriptionRelated requirements
1.Administrative examination
1.1DocumentationCorrectness of documentation
2.Visual inspection
2.1.Compliance with documentation
2.2.Identification / markings225, 226
2.3Materials219 to 223
3.Functional tests
3.1Remote communication for targeted roadside checks4, 197 to 199
3.2Recording and storing in data memory91
3.3Communication with Vehicle UnitAppendix 14 DSC_66 to DSC_70, DSC_71 to DSC_76
4.Environmental tests
4.1TemperatureVerify functionality through:Test according to ISO 16750-4, Chapter 5.1.1.2: Low temperature operation test (72 h @ – 20 °C)This test refers to IEC 60068-2-1: Environmental testing - Part 2-1: Tests - Test A: ColdTest according to ISO 16750-4: Chapter 5.1.2.2: High temperature operation test (72 h @ 70 °C)This test refers to IEC 60068-2-2: Basic environmental testing procedures; part 2: tests; tests B: dry heatTest according to ISO 16750-4: Chapter 5.3.2: Rapid change of temperature with specified transition duration (– 20 °C/70 °C, 20 cycles, dwell time 1 h at each temperature)A reduced set of tests (among those defined in section 3 of this table) can be carried out at the lower temperature, the higher temperature and during the temperature cycles213
4.2Protection against water and foreign bodiesTest according to ISO 20653: Road vehicles – Degree of protection (IP code) – Protection of electrical equipment against foreign objects, water and access (targeted value IP40)220, 221
5EMC tests
5.1Radiated emissions and susceptibilityCompliance with Regulation ECE R10218
5.2Electrostatic dischargeCompliance with ISO 10605:2008 + Technical Corrigendum:2010 + AMD1:2014: +/– 4 kV for contact and +/– 8 kV for air discharge218
5.3Conducted transient susceptibility on power supplyFor 24V versions: compliance with ISO 7637-2 + ECE Regulation No. 10 Rev. 3:pulse 1a: Vs=– 450V Ri=50 ohmspulse 2a: Vs=+37V Ri=2 ohmspulse 2b: Vs=+20V Ri=0,05 ohmspulse 3a: Vs=– 150V Ri=50 ohmspulse 3b: Vs=+150V Ri=50 ohmspulse 4: Vs=– 16V Va=-12V t6=100mspulse 5: Vs=+120V Ri=2,2 ohms td=250msFor 12V versions: compliance with ISO 7637-1 + ECE Regulation No. 10 Rev. 3:pulse 1: Vs=-75V Ri=10 ohmspulse 2a: Vs=+37V Ri=2 ohmspulse 2b: Vs=+10V Ri=0,05 ohmspulse 3a: Vs=– 112V Ri=50 ohmspulse 3b: Vs=+75V Ri=50 ohmspulse 4: Vs=– 6V Va=– 5V t6=15mspulse 5: Vs=+65V Ri=3ohms td=100msPulse 5 shall be tested only for vehicle units designed to be installed in vehicles for which no external common protection against load dump is implementedFor load dump proposal, refer to ISO 16750-2, 4th edition, chapter 4.6.4.218"
(e)the table in point 8 on interoperability tests is replaced by the following:
8.1Interoperability tests between vehicle units and tachograph cards8.2Interoperability tests between vehicle units and motion sensors8.3Interoperability tests between vehicle units and external GNSS facilities (when applicable)
"NoTestDescription
1Mutual authenticationCheck that the mutual authentication between the vehicle unit and the tachograph card runs normally
2Write/read testsExecute a typical activity scenario on the vehicle unit. The scenario shall be adapted to the type of card being tested and involve writings in as many EFs as possible in the cardVerify through a vehicle unit downloading that all corresponding recordings have been properly madeVerify through a card downloading that all corresponding recordings have been properly madeVerify through daily printouts that all corresponding recordings can be properly read
1PairingCheck that the pairing between the vehicle units and the motion sensors runs normally
2Activity testsExecute a typical activity scenario on the motion sensor. The scenario shall involve a normal activity and creating as many events or faults as possible.Verify through a vehicle unit downloading that all corresponding recordings have been properly madeVerify through a card downloading that all corresponding recordings have been properly madeVerify through a daily printout that all corresponding recordings can be properly read
1Mutual authenticationCheck that the mutual authentication (coupling) between the vehicle unit and the external GNSS module runs normally.
2Activity testsExecute a typical activity scenario on the external GNSS facility. The scenario shall involve a normal activity and creating as many events or faults as possible.Verify through a vehicle unit downloading that all corresponding recordings have been properly madeVerify through a card downloading that all corresponding recordings have been properly madeVerify through a daily printout that all corresponding recordings can be properly read"
(36)Appendix 11 is amended as follows:(a)in point 8.2.3, paragraph CSM_49 is replaced by the following:"CSM_49Vehicle units, tachograph cards and external GNSS facilities shall support the SHA-256, SHA-384 and SHA-512 algorithms specified in [SHS].";(b)in point 9.1.2, the first sub-paragraph of paragraph CSM_58 is replaced by the following:"CSM_58Whenever it generates a new European root key pair, the ERCA shall create a link certificate for the new European public key and sign it with the previous European private key. The validity period of the link certificate shall be 17 years plus 3 months. This is shown in Figure 1 in section 9.1.7 as well.";(c)in point 9.1.4, paragraph CSM_72 is replaced by the following:"CSM_72Two unique ECC key pairs shall be generated for each vehicle unit, designated as VU_MA and VU_Sign. This task is handled by VU manufacturers. Whenever a VU key pair is generated, the party generating the key shall send the public key to its MSCA, in order to obtain a corresponding VU certificate signed by the MSCA. The private key shall be used only by the vehicle unit.";(d)point 9.1.5 is amended as follows:(i)paragraph CSM_83 is replaced by the following:"CSM_83One unique ECC key pair, designated as Card_MA, shall be generated for each tachograph card. A second unique ECC key pair, designated as Card_Sign, shall additionally be generated for each driver card and each workshop card. This task may be handled by card manufacturers or card personalisers. Whenever a card key pair is generated, the party generating the key shall send the public key to its MSCA, in order to obtain a corresponding card certificate signed by the MSCA. The private key shall be used only by the tachograph card.";(ii)paragraph CSM_88 is replaced by the following:"CSM_88The validity period of a Card_MA certificate shall be as follows:For driver cards: 5 yearsFor company cards: 5 yearsFor control cards: 2 yearsFor workshop cards: 1 year";(iii)the following text is added in paragraph CSM_91:"—Additionally, for control cards, company cards and workshop cards only, and only if such cards are issued during the first three months of the validity period of a new EUR certificate: the EUR certificate that is two generations older, if existing.Note to last bullet: For example, in the first three months of the ERCA(3) certificate (see Figure 1), the mentioned cards shall contain the ERCA(1) certificate. This is needed to ensure that these cards can be used to perform data downloads from ERCA(1) VUs whose normal 15-year life period plus the 3-months data downloading period expires during these months; see the last bullet of requirement 13) in Annex IC.";(e)point 9.1.6 is amended as follows:(i)paragraph CSM_93 is replaced by the following:"CSM_93One unique ECC key pair shall be generated for each external GNSS facility, designated as EGF_MA. This task is handled by external GNSS facility manufacturers. Whenever an EGF_MA key pair is generated, the party generating th e key shall send the public key to its MSCA in order to obtain a corresponding EGF_MA certificate signed by the MSCA. The private key shall be used only by the external GNSS facility.";(ii)paragraph CSM_95 is replaced by the following:"CSM_95An external GNSS facility shall use its EGF_MA key pair, consisting of private key EGF_MA.SK and public key EGF_MA.PK, exclusively to perform mutual authentication and session key agreement towards vehicle units, as specified in section 11.4 of this Appendix.";(f)point 9.1.7 is amended as follows:(i)Figure 1 is replaced by the following:"Figure 1Issuance and usage of different generations of ERCA root certificates, ERCA link certificates, MSCA certificates and equipment certificates32018R0502_en_img_100 "(ii)paragraph 6 in the Notes to Figure 1 is replaced by the following:"6.To save space, the difference in validity period between the Card_MA and Card_Sign certificates is shown only for the first generation.";(g)point 9.2.1.1 is amended as follows:(i)in paragraph CSM_106, the first dash is replaced by the following:"—For 128-bit motion sensor master keys: CV = "B6 44 2C 45 0E F8 D3 62 0B 7A 8A 97 91 E4 5D 83" ";(ii)in paragraph CSM_107, the first sub-paragraph is replaced by the following:"Each Motion sensor manufacturer shall generate a random and unique pairing key KP for every motion sensor, and shall send each pairing key to its Member State Certificate Authority. The MSCA shall encrypt each pairing key separately with the motion sensor master key KM and shall return the encrypted key to the motion sensor manufacturer. For each encrypted key, the MSCA shall notify the motion sensor manufacturer of the version number of the associated KM.";(iii)paragraph CSM_108 is replaced by the following:"CSM_108Each motion sensor manufacturer shall generate a unique serial number for every motion sensor, and shall send all serial numbers to its Member State Certificate Authority. The MSCA shall encrypt each serial number separately with the identification key KID and shall return the encrypted serial number to the motion sensor manufacturer. For each encrypted serial number, the MSCA shall notify the motion sensor manufacturer of the version number of the associated KID.";(h)point 9.2.2.1 is amended as follows:(i)paragraph CSM_123 is replaced by the following:"CSM_123For every vehicle unit, the vehicle unit manufacturer shall create a unique VU serial number and shall send this number to its Member State Certificate Authority in a request to obtain a set of two VU-specific DSRC keys. The VU serial number shall have data type 32018R0502_en_img_101 .Note:This VU serial number shall be identical to the vuSerialNumber element of VuIdentification, see Appendix 1 and to the Certificate Holder Reference in the VU’s certificates.The VU serial number may not be known at the moment a vehicle unit manufacturer requests the VU-specific DSRC keys. In this case, the VU manufacturer shall send instead the unique certificate request ID it used when requesting the VU’s certificates; see CSM_153. This certificate request ID shall therefore be equal to the Certificate Holder Reference in the VU’s certificates.";(ii)in paragraph CSM_124, the info requirement in step 2 is replaced by the following:"info = VU serial number or certificate request ID, as specified in CSM_123";(iii)paragraph CSM_128 is replaced by the following:"CSM_128The MSCA shall keep records of all VU-specific DSRC keys it generated, their version number and the VU serial number or certificate request ID used in deriving them.";(i)in point 9.3.1, the first sub-paragraph in paragraph CSM_135 is replaced by the following:"The Distinguished Encoding Rules (DER) according to [ISO 8825-1] shall be used to encode the data objects within certificates. Table 4 shows the full certificate encoding, including all tag and length bytes.";(j)in point 9.3.2.3, paragraph CSM_141 is replaced by the following:"CSM_141The Certificate Holder Authorisation shall be used to identify the type of certificate. It consists of the six most significant bytes of the Tachograph Application ID, concatenated with the equipment type, which indicates the type of equipment for which the certificate is intended. In the case of a VU certificate, a driver card certificate or a workshop card certificate, the equipment type is also used to differentiate between a certificate for Mutual Authentication and a certificate for creating digital signatures (see section 9.1 and Appendix 1, data type EquipmentType).";(k)in point 9.3.2.5, the following sub-paragraph is added in paragraph CSM_146:"Note: For a card certificate, the value of the CHR shall be equal to the value of the cardExtendedSerialNumber in EF_ICC; see Appendix 2. For an EGF certificate, the value of the CHR shall be equal to the value of the sensorGNSSSerialNumber in EF_ICC; see Appendix 14. For a VU certificate, the value of the CHR shall be equal to the vuSerialNumber element of VuIdentification, see Appendix 1, unless the manufacturer does not know the manufacturer-specific serial number at the time the certificate is requested.";(l)in point 9.3.2.6, paragraph CSM_148 is replaced by the following:"CSM_148The Certificate Effective Date shall indicate the starting date and time of the validity period of the certificate.";(m)point 9.3.3 is amended as follows:(i)in paragraph CSM_151, the first sub-paragraph is replaced by the following:"When requesting a certificate, an MSCA shall send the following data to the ERCA:";(ii)paragraph CSM_153 is replaced by the following:"CSM_153An equipment manufacturer shall send the following data in a certificate request to an MSCA, allowing the MSCA to create the Certificate Holder Reference of the new equipment certificate:If known (see CSM_154), a serial number for the equipment, unique for the manufacturer, the equipment's type and the month of manufacturing. Otherwise, a unique certificate request identifier.The month and the year of equipment manufacturing or of the certificate request.The manufacturer shall ensure that this data is correct and that the certificate returned by the MSCA is inserted in the intended equipment.";(n)point 10.2.1 is amended as follows:(i)in paragraph CSM_157, the text before the Notes to Figure 4 is replaced by the following:"Vehicle units shall use the protocol depicted in Figure 4 for verifying a tachograph card’s certificate chain. For every certificate it reads from the card, the VU shall verify that the Certificate Holder Authorisation (CHA) field is correct:The CHA field of the Card certificate shall indicate a card certificate for mutual authentication (see Appendix 1, data type EquipmentType).The CHA of the Card.CA certificate shall indicate an MSCA.The CHA of the Card.Link certificate shall indicate the ERCA.";(ii)in paragraph CSM_159, the following sentence is added:"Whereas storing of all other types of certificate is optional, it is mandatory for a VU to store a new link certificate presented by a card.";(o)point 10.2.2 is amended as follows:(i)in paragraph CSM_161, the text before the Figure 5 is replaced by the following:"Tachograph cards shall use the protocol depicted in Figure 5 for verifying a VU's certificate chain. For every certificate presented by the VU, the card shall verify that the Certificate Holder Authorisation (CHA) field is correct:The CHA of the VU.Link certificate shall indicate the ERCA.The CHA of the VU.CA certificate shall indicate an MSCA.The CHA field of the VU certificate shall indicate a VU certificate for mutual authentication (see Appendix 1, data type EquipmentType).";(ii)paragraph CSM_165 is replaced by the following:"CSM_165If the MSE: Set AT command is successful, the card shall set the indicated VU.PK for subsequent use during Vehicle Authentication, and shall temporarily store Comp(VU.PKeph). In case two or more successful MSE: Set AT commands are sent before session key agreement is performed, the card shall store only the last Comp(VU.PKeph) received. The card shall reset Comp(VU.PKeph) after a successful GENERAL AUTHENTICATE command.";(p)point 10.3 is amended as follows:(i)the first sub-paragraph in paragraph CSM_170 is replaced by the following:"Next to the card challenge, the VU shall include in the signature the certificate holder reference taken from the card certificate.";(ii)in paragraph CSM_171, Figure 6 is replaced by the following:"Figure 6VU Authentication protocol32018R0502_en_img_102 "(iii)paragraph CSM_174 is replaced by the following:"CSM_174Upon receiving the VU’s signature in an EXTERNAL AUTHENTICATE command, the card shallCalculate the authentication token by concatenating Card.CHR, the card challenge rcard and the identifier of the VU ephemeral public key Comp(VU.PKeph),Verify the VU’s signature using the ECDSA algorithm, using the hashing algorithm linked to the key size of the VU’s VU_MA key pair as specified in CSM_50, in combination with VU.PK and the calculated authentication token.";(q)in point 10.4, paragraph CSM_176 is amended as follows:(i)sub-paragraph 2 is replaced by the following:"2.The VU sends the public point VU.PKeph of its ephemeral key pair to the card. The public point shall be converted to an octet string as specified in [TR-03111]. The uncompressed encoding format shall be used. As explained in CSM_164, the VU generated this ephemeral key pair prior to the verification of the VU certificate chain. The VU sent the identifier of the ephemeral public key Comp(VU.PKeph) to the card, and the card stored it.";(ii)sub-paragraph 6 is replaced by the following:"6.Using KMAC, the card computes an authentication token over the VU ephemeral public point: TPICC = CMAC(KMAC, VU.PKeph). The public point shall be in the format used by the VU (see bullet 2 above). The card sends NPICC and TPICC to the vehicle unit.";(r)in point 10.5.2, paragraph CSM_191 is replaced by the following:"CSM_191Any data object to be encrypted shall be padded according to [ISO 7816-4] using padding-content indicator "01". For the calculation of the MAC, data objects in the APDU shall be padded according to [ISO 7816-4].Note: Padding for Secure Messaging is always performed by the secure messaging layer, not by the CMAC or CBC algorithms.Summary and ExamplesA command APDU with applied Secure Messaging will have the following structure, depending on the case of the respective unsecured command (DO is data object):Case 1CLA INS P1 P2 || Lc' || DO "8E" || LeCase 2CLA INS P1 P2 || Lc' || DO "97" || DO"8E" || LeCase 3 (even INS byte)CLA INS P1 P2 || Lc' || DO "81" || DO"8E" || LeCase 3 (odd INS byte)CLA INS P1 P2 || Lc' || DO "B3" || DO"8E" || LeCase 4 (even INS byte)CLA INS P1 P2 || Lc' || DO "81" || DO"97" || DO"8E" || LeCase 4 (odd INS byte)CLA INS P1 P2 || Lc' || DO "B3" || DO"97" || DO"8E" || Lewhere Le = "00’ or ‘00 00" depending on whether short length fields or extended length fields are used; see [ISO 7816-4].A response APDU with applied Secure Messaging will have the following structure, depending on the case of the respective unsecured response:Case 1 or 3DO "99" || DO "8E" || SW1SW2Case 2 or 4 (even INS byte) without encryptionDO "81" || DO "99" || DO "8E" || SW1SW2Case 2 or 4 (even INS byte) with encryptionDO "87" || DO "99" || DO "8E" || SW1SW2Case 2 or 4 (odd INS byte) without encryptionDO "B3" || DO "99" || DO "8E" || SW1SW2Note: Case 2 or 4 (odd INS byte) with encryption is never used in the communication between a VU and a card.Below are three example APDU transformations for commands with even INS code. Figure 8 shows an authenticated Case 4 command APDU, Figure 9 shows an authenticated Case 1/Case 3 response APDU, and Figure 10 shows an encrypted and authenticated Case 2/Case 4 response APDU.Figure 8Transformation of an authenticated Case 4 Command APDU32018R0502_en_img_103Figure 9Transformation of an authenticated Case 1 / Case 3 Response APDU32018R0502_en_img_104Figure 10Transformation of an encrypted and authenticated Case 2/Case 4 Response APDU32018R0502_en_img_105 "(s)in point 10.5.3, paragraph CSM_193 is replaced by the following:"CSM_193A tachograph card shall abort an ongoing Secure Messaging session if and only if one of the following conditions occur:it receives a plain command APDU,it detects a Secure Messaging error in a command APDU:An expected Secure Messaging data object is missing, the order of data objects is incorrect, or an unknown data object is included.A Secure Messaging data object is incorrect, e.g. the MAC value is incorrect or the TLV structure is incorrect.it is depowered or reset,the VU starts the VU Authentication process,the limit for the number of commands and associated responses within the current session is reached. For a given card, this limit shall be defined by its manufacturer, taking into account the security requirements of the hardware used, with a maximum value of 240 SM commands and associated responses per session";(t)point 11.3.2 is amended as follows:(i)the first sub-paragraph of paragraph CSM_208 is replaced by the following:"During the coupling to a VU, an external GNSS facility shall use the protocol depicted in Figure 5 (section 10.2.2) for verifying the VU's certificate chain";(ii)paragraph CSM_210 is replaced by the following:"CSM_210Once it has verified the VU_MA certificate, the external GNSS facility shall store this certificate for use during normal operation; see section 11.3.3.";(u)in point 11.3.3, the first sub-paragraph in paragraph CSM_211, is replaced by the following:"During normal operation, a vehicle unit and an EGF shall use the protocol depicted in Figure 11 for verifying the temporal validity of the stored EGF_MA certificate and for setting the VU_MA public key for subsequent VU Authentication. No further mutual verification of the certificate chains shall take place during normal operation.";(v)in point 12.3, Table 6 is replaced by the following:
"Table 6Number of plaintext and encrypted data bytes per instruction defined in [ISO 16844-3]
InstructionRequest / replyDescription of data# of plaintext data bytes according to[ISO 16844-3]# of plaintext data bytes using AES keys# of encrypted data bytes when using AES keys of bitlength
128192256
10requestAuthentication data + file number88161616
11replyAuthentication data + file contents16 or 32, depend on file16 or32, depend on file32 / 4832 / 4832 / 48
41requestMoS serial number88161616
41replyPairing key1616 / 24 / 32163232
42requestSession key1616 / 24 / 32163232
43requestPairing information2424323232
50replyPairing information2424323232
70requestAuthentication data88161616
80replyMoS counter value + auth. data88161616"
(w)in point 13.1, the requirement on the VU serial number in subparagraph CSM_224 is replaced by the following:"VU serial numberthe VU’s serial number or certificate request ID (data type VuSerialNumber or CertificateRequestID) – see CSM_123";(x)in point 13.3, the second indent in paragraph CSM_228 is replaced by the following:"2.The control card shall use the indicated DSRC master key in combination with the VU serial number or the certificate request ID in the DSRC security data to derive the VU-specific DSRC keys K_VUDSRC_ENC and K_VUDSRC_MAC, as specified in CSM_124.";(y)point 14.3 is amended as follows:(i)in paragraph CSM_234, the text before the Notes to figure 13 is replaced by the following:"An IDE may perform verification of a signature over downloaded data itself or it may use a control card for this purpose. In case it uses a control card, signature verification shall take place as shown in Figure 13. For verifying the temporal validity of a certificate presented by the IDE, the control card shall use its internal current time, as specified in CSM_167. The control card shall update its current time if the Effective Date of an authentic "valid source of time" certificate is more recent than the card’s current time. The card shall accept only the following certificates as a valid source of time:Second-generation ERCA link certificatesSecond-generation MSCA certificatesSecond-generation VU_Sign or Card_Sign certificates issued by the same country as the control card’s own card certificate.In case it performs signature verification itself, the IDE shall verify the authenticity and validity of all certificates in the certificate chain in the data file, and it shall verify the signature over the data following the signature scheme defined in [DSS]. In both cases, for every certificate read from the data file, it is necessary to verify that the Certificate Holder Authorisation (CHA) field is correct:The CHA field of the EQT certificate shall indicate a VU or Card (as applicable) certificate for signing (see Appendix 1, data type EquipmentType).The CHA of the EQT.CA certificate shall indicate an MSCA.The CHA of the EQT.Link certificate shall indicate the ERCA.";(ii)Figure 13 is replaced by the following:"Figure 13Protocol for verification of the signature over a downloaded data file32018R0502_en_img_106 "
(37)Appendix 12 is amended as follows:(a)point 3 is amended as follows:(i)in paragraph GNS_4, the second sub-paragraph after Figure 2 is replaced by the following:"The resolution of the position is based on the format of the RMC sentence described above. The first part of the fields 3) and 5) are used to represent the degrees. The rest are used to represent the minutes with three decimals. So the resolution is 1/1000 of minute or 1/60000 of degree (because one minute is 1/60 of a degree).";(ii)Paragraph GNS_5 is replaced by the following:"GNS_5The Vehicle Unit shall store in the VU database the position information for latitude and longitude with a resolution of 1/10 of minute or 1/600 of a degree as described in Appendix 1 for type GeoCoordinates.The GPS DOP and active satellites (GSA) command can be used by the VU to determine and record the signal availability and accuracy. In particular the HDOP is used to provide an indication on the level of accuracy of the recorded location data (see 4.2.2). The VU will store the value of the Horizontal Dilution of Precision (HDOP) calculated as the minimum of the HDOP values collected on the available GNSS systems.The GNSS Id. indicates the corresponding NMEA Id. for every GNSS constellation and Satellite-Based Augmentation System (SBAS).Figure 3Structure of the GSA sentence32018R0502_en_img_107 "(iii)paragraph GNS_6 is replaced by the following:"GNS_6The GSA sentence shall be stored with record number "02" to "06"";(b)point 4.2.1 is amended as follows:(i)paragraph GNS_16 is replaced by the following:"GNS_16In the communication protocol, extended length fields shall not be supported.";(ii)paragraph GNS_18 is replaced by the following:"GNS_18Regarding the functions 1) the collection and distribution of GNSS data and 2) the collection of the configuration data of the external GNSS facility and 3) management protocol, the GNSS Secure Transceiver shall simulate a smart card with a file system architecture composed by a Master File (MF), a Dedicated File (DF) with Application Identifier specified in Appendix 1 chapter 6.2 ("FF 44 54 45 47 4D") and with 3 EFs containing certificates and one single Elementary File (EF.EGF) with file identifier equal to "2F2F" as described in Table 1.";(iii)paragraph GNS_20 is replaced by the following:"GNS_20The GNSS Secure Transceiver shall use a memory to store the data and be able to perform at least 20 millions write/read cycles. Apart from this aspect, the internal design and implementation of the GNSS Secure Transceiver is left to the manufacturers.The mapping of record numbers and data is provided in Table 1. Note that there are five GSA sentences for the GNSS constellations and Satellite-Based Augmentation System (SBAS).";(c)in point 4.2.2, sub-paragraph 5 in paragraph GNS_23 is replaced by the following:"5.The VU processor checks the received data extracting the information (e.g., latitude, longitude, time) from the RMC NMEA sentence. The RMC NMEA sentence includes the information if the position is valid. If the position is not valid, the location data is not available yet and it cannot be used to record the position of the vehicle. If the position is valid, the VU processor also extracts the values of HDOP from GSA NMEA sentences and calculate the minimum value on the available satellite systems (i.e., when the fix is available).";(d)In point 4.4.1, paragraph GNS_28 is replaced by the following:"GNS_28If the VU does not manage to communicate to the coupled external GNSS facility for more than 20 continuous minutes, the VU shall generate and record in the VU an event of type EventFaultType with the value of enum "0E"H Communication error with the external GNSS facility and with the timestamp set to the current time. The event will be generated only if the following two conditions are satisfied: (a) the Smart Tachograph is not in calibration mode and (b) the vehicle is moving. In this context, a communication error is triggered when the VU Secure Transceiver does not receive a response message after a request message as described in 4.2.";(e)in point 4.4.2, paragraph GNS_29 is replaced by the following:"GNS_29If the external GNSS facility has been breached, the GNSS Secure Transceiver shall erase all its memory including cryptographic material. As described in GNS_25 and GNS_26, the VU shall detect tampering if the Response has status "6690". The VU shall then generate an event of type EventFaultType enum "19"H Tamper detection of GNSS. Alternately, the external GNSS facility may not respond to any external request anymore.";(f)in point 4.4.3, paragraph GNS_30 is replaced by the following:"GNS_30If the GNSS Secure Transceiver does not receive data from the GNSS receiver for more than 3 continuous hours, the GNSS Secure Transceiver shall generate a response message to the READ RECORD command with RECORD number equal to "01" with a Data Field of 12 bytes all set to 0xFF. Upon reception of the Response message with this value of the data field, the VU shall generate and record an event of type EventFaultType enum "0D"H Absence of position information from GNSS receiver event with a timestamp equal to the current value of time only if the following two conditions are satisfied: a) the Smart Tachograph is not in calibration mode and b) the vehicle is moving.";(g)in point 4.4.4, the text in paragraph GNS_31 until Figure 4, is replaced by the following:"If the VU detects that the EGF certificate used for mutual authentication is not valid any longer, the VU shall generate and record a recording equipment event of type EventFaultType enum "1B"H External GNSS facility certificate expired with a timestamp equal to the current value of time. The VU shall still use the received GNSS position data.";(h)in point 5.2.1, paragraph GNS_34 is replaced by the following:"GNS_34If the VU does not receive data from the GNSS receiver for more than 3 continous hours, the VU shall generate and record an event of type EventFaultType enum "0D"H Absence of position information from GNSS receiver event with a timestamp equal to the current value of time only if the following two conditions are satisfied: (a) the Smart Tachograph is not in calibration mode and (b) the vehicle is moving.";(i)point 6 is replaced by the following:"6.GNSS TIME CONFLICTIf the VU detects a discrepancy of more than 1 minute between the time of the vehicle unit's time measurement function and the time originating from the GNSS receiver, the VU will record an event of type EventFaultType enum "0B"H Time conflict (GNSS versus VU internal clock). After a time conflict event has been triggered, the VU will not check the time discrepancy for the next 12 hours. This event shall not be triggered in cases no valid GNSS signal was detectable by the GNSS receiver within the last 30 days.";(38)Appendix 13 is amended as follows:(a)in point 2, the fourth paragraph is replaced by the following:"For clarification, this Appendix does not specify:The collection of the Data operation and management within the VU (which shall be specified elsewhere within the Regulation or otherwise shall be a function of product design).The form of presentation of collected data to application hosted on the external device.Data security provisions above what provides Bluetooth® (such as encryption) concerning the content of the Data (which shall be specified elsewhere within the Regulation [Appendix 11 Common Security Mechanisms]).The Bluetooth® protocols used by the ITS interface";(b)in point 4.2, the third paragraph is replaced by the following:"When an external device comes within range of the VU for the first time, the Bluetooth® pairing process can be initiated (see also annex 2). The devices share their addresses, names, and profiles and common secret key, which allows them to bond whenever they are together in the future. Once this step is completed, the external device is trusted and is in state to initiate requests to download data from the tachograph. It is not foreseen to add encryption mechanisms beyond what Bluetooth® provides. However, if additional security mechanisms are needed, this will be done in accordance with Appendix 11 Common Security Mechanisms.";(c)point 4.3 is amended as follows:(i)the first paragraph is replaced by the following:"For security reasons, the VU will require a PIN code authorization system separated from the Bluetooth pairing. Each VU shall be able to generate PIN codes for authentication purposes composed of at least 4 digits. Every time an external device pairs with the VU, it must provide the correct PIN code before receiving any data.";(ii)the third paragraph after Table 1 is replaced by the following:"While the manufacturer may offer an option to change the PIN code directly through the VU, the PUC code shall not be alterable. Modifying the PIN code, if possible, shall require to enter the current PIN code directly in the VU.";(d)in point 4.4, the second paragraph after the heading "Data Field" is replaced by the following:"If the data to be handled is larger than the available space in one message, it will be split in several submessages. Each submessage shall have the same Header and SID, but will contain a 2-bytes counter, Counter Current (CC) and Counter Max (CM), to indicate the submessage number. To enable error checking and abort the receiving device acknowledges every submessage. The receiving device can accept the submessage, ask for it to be re-transmitted, request the sending device to start again or abort the transmission.";(e)Annex 1 is amended as follows:(i)the heading is replaced by the following:"(1)LIST OF AVAILABLE DATA THROUGH THE ITS INTERFACE";(ii)the following item is inserted in the table in point (3), after the item "Absence of position information from GNSS receiver":
"Communication error with the external GNSS facilitythe longest event for each of the 10 last days of occurrence,the 5 longest events over the last 365 days.date and time of beginning of event,date and time of end of event,card(s) type, number, issuing Member State and generation of any card inserted at beginning and/or end of the event,number of similar events that day."
(iii)in point (5), the following dash is added:"—ITS interface fault (if applicable)";
(f)the ASN.1 specifications in Annex 3 are amended as follows:(i)the following lines 206a to 206e are inserted after line 206:"32018R0502_en_img_108 "(ii)lines 262 to 264 are replaced by the following:"32018R0502_en_img_109 "(iii)line 275 is replaced by the following:"32018R0502_en_img_110 "(iv)lines 288 to 310 are replaced by the following:"32018R0502_en_img_111 "(v)lines 362 and 363 are replaced by the following:"32018R0502_en_img_112 "(vi)the following lines 410a and 410b are inserted after line 410:"32018R0502_en_img_113 "(vii)the following lines 539a to 539j are inserted after line 539:"32018R0502_en_img_114 "
(39)Appendix 14 is amended as follows:(a)item 5.5 in the Table of Contents is replaced by the following:"5.5Support for Directive (EU) 2015/719 … 490";(b)in point 2, the third paragraph is replaced by the following:"In this scenario, the time available for communication is limited, because the Communication is targeted and of a short- range design. Further, the same communication means for remote tachograph monitoring (RTM) may also be used by the competent control authorities for other applications (such as the maximal weights and dimensions for heavy goods vehicles defined in Directive (EU) 2015/719) and such operations may be separate or sequential at the discretion of the competent control authorities.";(c)point 5.1 is amended as follows:(i)in paragraph DSC_19, the twelfth dash is replaced by the following:"—The DSRC-VU antenna shall be positioned at a location where it optimizes the DSRC communication between the vehicle and the roadside reader antenna, when the reader is installed 15 meters distance in front of the vehicle and 2 meters height, targeting the horizontal and vertical centre of the windscreen. For light vehicles an installation corresponding to the upper part of the windscreen is suitable. For all the other vehicles the DSRC antenna shall be installed either near the lower or near the upper part of the windscreen.";(ii)in paragraph DSC_22, the first sub-paragraph is replaced by the following:"The form factor of the antenna is not defined and shall be a commercial decision, so long as the fitted DSRC-VU meets the conformance requirements defined in section 5 below. The antenna shall be positioned as determined in DSC_19 and efficiently support the use cases described in in 4.1.2 and 4.1.3.";(d)in point 5.4.3, sequence 7 is replaced by the following:
"7REDCR>DSRC-VUSends GET.request for data of other Attribute (if appropriate)"
(e)in point 5.4.4, the ASN.1 module definition in paragraph DCS_40 is amended as follows:(i)the first line of the sequence for 32018R0502_en_img_115 is replaced by the following:"32018R0502_en_img_116 "(ii)the following footnote 1 is added:"1.if a LPN contains an AlphabetIndicator LatinAlphabetNo2 or latinCyrillicAlphabet, the special characters are remapped at the road interrogator unit applying special rules according to Annex E of ISO/DIS 14906,2";(iii)the superscript 2 is removed from the line where the Timestamp of current record is defined;(iv)the ASN.1 module definition for 32018R0502_en_img_117 is replaced by the following:"32018R0502_en_img_118 "(f)in point 5.4.5, item RTM12 in table 14.3 is replaced by the following:
"RTM12Sensor FaultThe VU shall generate an integer value for data element RTM12.The VU shall assign to the variable sensorFault a value of:1 if an event of type "35H" Sensor fault has been recorded in the last 10 days,2 if an event of type GNSS receiver fault (either internal or external with enum values "36’H or ‘37" H) has been recorded in the last 10 days.3 if an event of type "0E"H Communication error with the external GNSS facility event has been recorded in the last 10 days.4 If both Sensor Fault and GNSS receiver faults have been recorded in the last 10 days5 If both Sensor Fault and Communication error with the external GNSS facility event have been recorded in the last 10 days6 If both GNSS receiver fault and Communication error with the external GNSS facility event have been recorded in the last 10 days7 If all three sensor faults, have been recorded in the last 10 days ELSE it shall assign a value of 0 if no events have been recorded in the last 10 days– sensor fault one octet as per data dictionary32018R0502_en_img_119 "
(g)in point 5.4.6, DSC_43 is replaced by the following:"DSC_43For all DSRC exchanges, data shall be encoded using PER (Packed Encoding Rules) UNALIGNED, apart from 32018R0502_en_img_120 and 32018R0502_en_img_121 , which shall be encoded using OER (Octet Encoding Rules) defined in ISO/IEC 8825-7, Rec. ITU-T X.696.";(h)in point 5.4.7, in the Fourth column of Table 14.9, the text in the cell describing 32018R0502_en_img_122 is replaced by the following:"Object Identifier of the supported standard, part, and version. Example: ISO (1) Standard (0) TARV (15638) part9 (9) Version1 (1).First octet is 06H, which is the Object Identifier. Second octet is 06H, which is its length. Subsequent 6 octets encode the example Object Identifier.";(i)points 5.5 and 5.5.1 are replaced by the following:"5.5.Support for Directive (EU) 2015/7195.5.1.OverviewDSC_59To support the Directive (EU) 2015/719 on the maximal weights and dimensions for heavy goods vehicles, the transaction protocol to download OWS data across the 5,8 GHz DSRC interface link will be the same as that used for the RTM data (see 5.4.1), the only difference being that the Object Identifier that relates to the TARV standard will be addressing the ISO 15638 standard (TARV) Part 20 related to WOB/OWS.";(j)in point 5.6.1, sub-paragraph (a) in paragraph DSC_68 is replaced by the following:"(a)In order that different suppliers may be contracted to supply the VU and the DSRC-VU, and indeed different batches of DSRC-VU, the connection between the VU and the DSRC-VU not internal to the VU shall be an open standard connection. The VU shall connect with the DSRC-VU either";(k)in point 5.7.1, paragraph DSC_77 is replaced by the following:"DSC_77The Data shall be provided, already secured, by the VUSM function to the DSRC-VU. The VUSM shall verify that data recorded in the DSRC-VU has been recorded correctly. The recording and reporting of any errors in the transfer of data from the VU to the memory of the DSRC-VU shall be recorded with type EventFaultType and enum value set to "0C"H Communication error with the remote communication facility event together with the timestamp.";
(40)Appendix 15 is amended as follows:(a)the first paragraph of point 2.2 is replaced by the following:"It is understood that first generation tachograph cards are interoperable with first generation vehicle units in compliance with Annex IB to Regulation (EEC) No 3821/85, while second generation tachograph cards are interoperable with second generation vehicle units in compliance with Annex IC to this Regulation. In addition, the requirements below shall apply.";(b)in point 2.4.1, paragraph MIG_11 is amended as follows:(i)the first indent is replaced by the following:"—non signed EFs IC and ICC (optional),";(ii)the third indent is replaced by the following:"—the other application data EFs (within DF Tachograph) requested by the first generation card download protocol. This information shall be secured with a digital signature, according to the first generation security mechanisms.Such download shall not include application data EFs only present in second generation driver (and workshop) cards (application data EFs within DF Tachograph_G2).";(c)In point 2.4.3, paragraphs MIG_014 and MIG_015 are replaced by the following:"MIG_014Outside the frame of drivers' control by non EU control authorities, data shall be downloaded from second generation vehicle units using the second generation security mechanisms, and the data download protocol specified in Appendix 7 of this Annex.MIG_015To allow drivers' control by non EU control authorities, it may optionally also be possible to download data from second generation vehicle units using the first generation security mechanisms. Downloaded data shall then have the same format as data downloaded from a first generation vehicle unit. This capability may be selected through commands in the menu.";
ANNEX IIAnnex II to Regulation (EU) 2016/799 is amended as follows:(1)in Chapter I, paragraph b) in point 1 is replaced by the following:"(b)an approval number corresponding to the number of the approval certificate drawn up for the prototype of the recording equipment or the record sheet or the tachograph card, placed at any point within the immediate proximity of that rectangle.";(2)in Chapter III, point 5 is replaced by the following:"5.Submitted for approval on …";(3)in Chapter IV, point 5 is replaced by the following:"5.Submitted for approval on …".