Container Format Specification. Version 1.2-27.05.2015. Page i



Similar documents
Technical Interface Description

Mobility Data Marketplace The German approach for the exchange of dynamic traffic data

Model User Guide for Implementing Online Insurance Verification

Direct message exhange with Finnish Customs

The Global Justice Reference Architecture (JRA) Web Services Service Interaction Profile

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

This Working Paper provides an introduction to the web services security standards.

Securing Web Services Using Microsoft Web Services Enhancements 1.0. Petr PALAS PortSight Software Architect

Digital Signature Web Service Interface

Developer Guide to Authentication and Authorisation Web Services Secure and Public

XML Signatures in an Enterprise Service Bus Environment

EMS E-COMMERCE GATEWAY API TECHNICAL INSTALLATION MANUAL FEBRUARY 2016

Web Service Security Vulnerabilities and Threats in the Context of WS-Security

e-filing Secure Web Service User Manual

HexaCorp. White Paper. SOA with.net. Ser vice O rient ed Ar c hit ecture

Chapter 9. IP Secure

Secure Authentication and Session. State Management for Web Services

Real-Time Connectivity Specifications For. 270/271 and 276/277 Inquiry Transactions. United Concordia Dental (UCD)

Corporate Access File Transfer Service Description Version /05/2015

Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems

Standard Recommended Practice extensible Markup Language (XML) for the Interchange of Document Images and Related Metadata

Management and Web service Management

igovt logon service Context Mapping Service (icms) Messaging Specification Release 9.6

EUR-Lex 2012 Data Extraction using Web Services

17 March 2013 NIEM Web Services API Version 1.0 URI:

CONTRACT MODEL IPONZ DESIGN SERVICE VERSION 2. Author: Foster Moore Date: 20 September 2011 Document Version: 1.7

Mobility Information Series

02267: Software Development of Web Services

[MS-ASMS]: Exchange ActiveSync: Short Message Service (SMS) Protocol

SAP HANA Cloud Integration CUSTOMER

Key Management and Distribution

Foreign Account Tax Compliance Act (FATCA) Foreign Account Tax Compliance Act (FATCA) FATCA Reports

NEMSIS v3 Web Services Guide

Most common problem situations in direct message exchange

Oracle Application Server 10g Web Services Frequently Asked Questions Oct, 2006

Run-time Service Oriented Architecture (SOA) V 0.1

EP A1 (19) (11) EP A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: Bulletin 2011/37

Federated Identity Management Solutions

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

OSCI Transport 1.2 Specification Status: FINAL OSCI Leitstelle

Rotorcraft Health Management System (RHMS)

Web Services Trust and XML Security Standards

European Commission e-trustex Software Architecture Document

Introduction to UDDI: Important Features and Functional Concepts

Structured Data Capture (SDC) Trial Implementation

Presentation / Interface 1.3

Overview: FedPayments Reporter Interface to Online Banking Cash Management Systems

AS4: Web Services for B2B. GS1 etg White Paper. Issue 1, Approved, July AS4: Web Services for B2B GS1 etg White Paper

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems

Attachment 6 - Interface For External Systems Wersja: 4.0

PeopleTools 8.55: Reporting Web Services

CS 356 Lecture 28 Internet Authentication. Spring 2013

FICOM S (THE FINNISH FEDERATION FOR TELECOMMUNICATIONS AND TELEINFORMATICS) APPLICATION GUIDELINE FOR ETSI S MSS STANDARDS: V2.

Web Services Technologies

Java Security Web Services Security (Overview) Lecture 9

Web Services Security SOAP Messages with Attachments (SwA) Profile 1.1

MINISTRY OF FINANCE SYSTEM INTEGRATION PLAN ATTACHMENT NR 2 SEAP XML SPECIFICATION WEBSERVICE INTERFACE FOR EXTERNAL SYSTEMS PROJECT ECIP/SEAP

Improving performance for security enabled web services. - Dr. Colm Ó héigeartaigh

United Concordia (UCD) Real Time Claim Submission & Adjudication Connectivity Specifications

Securing Web Services From Encryption to a Web Service Security Infrastructure

Server based signature service. Overview

Semester Thesis Traffic Monitoring in Sensor Networks

WEB SERVICES SECURITY

TIB 2.0 Administration Functions Overview

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Message exchange with. Finnish Customs

Outage Notification. "Acknowledgment: This material is based upon work supported by the Department of Energy under Award Number DE-OE

PROTOTYPE IMPLEMENTATION OF A DEMAND DRIVEN NETWORK MONITORING ARCHITECTURE

PowerCenter Real-Time Development

OKLAHOMA TAX COMMISSION

Trade Software Developer Technical Seminar Document Imaging System Celestine Harrell Shailesh Sardesai. March 7, 2012

WebService Security. A guide to set up highly secured client-server communications using WS-Security extensions to the SOAP protocol

Multiple electronic signatures on multiple documents

Media Object Server (MOS ) Protocol v3.8.3 Web Services

Den Gode Webservice - Security Analysis

A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems

Protocol Data Units and Encapsulation

Business Object Document (BOD) Message Architecture for OAGIS Release 9.+

Prescription Monitoring Program Information Exchange Service. Execution Context Version 1.0

Detailed Specifications

New York State Federal/State Employment Tax (FSET) Handbook for Software Developers

Norwegian e-health Infrastructure based on XML, ebxml and PKI

Open Geospatial Consortium, Inc.

ATWD XML Web Service Handbook

GetLibraryUserOrderList

Encryption, Signing and Compression in Financial Web Services

X Real-Time Claim Submission & Connectivity Specifications. Highmark, Inc. October 1, 2014 Document Version 1.1

Network Security. Chapter 10. Application Layer Security: Web Services. Part I: Introduction to Web Services

IP Addressing. IP Addresses. Introductory material.

Technik und Informatik. SOAP Security. Prof. Dr. Eric Dubuis Berner Fachhochschule Biel. Version April 11, 2012

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Web Services Security: What s Required To Secure A Service-Oriented Architecture. An Oracle White Paper January 2008

SOAP WSDL & HTTP MIME REST Web Services Companion Guide HIPAA Operating Rules (HOpR) CORE Phase II

Transcription:

Container Format Specification Version 1.2-27.05.2015 Page i

Table of contents 1 Introduction... 1 1.1 Referenced documents... 1 1.2 Abbreviations... 1 2 Container format... 2 2.1 Construction of the container header... 3 2.2 Construction of the container body... 7 2.3 XML example... 11 Page ii

List of tables Table 1: Structural information in the container model... 7 Table 2: Characteristics type attribute V1.0... 9 List of figures Figure 1: Overview Container Model... 2 Figure 2: Container model - Header Element Structure... 4 Figure 3: Construction Timestamp Element... 5 Figure 4: Structure of the signature element... 6 Figure 5: Structure of the XML element... 8 Figure 6: Structure of the binary element... 8 Figure 7: Container model - Body Element Structure... 10 Page iii

1 Introduction 1.1 Referenced documents [Source] [DatexIISchema] [WS Security Core Specification 1.1] Publisher Schema of Datex II V2.0 specification OASIS Standard 1.1: WS-Security Core Specification 1.1 http://www.oasis- open.org/committees/download.php/16790/wss-v1.1- spec-os-soapmessagesecurity.pdf 1.2 Abbreviations Abbreviation MDM MDM Platform XML XSD Description Mobility Data Marketplace Mobility Data Marketplace platform extensible Markup Language XML Schema Definition Page 1

2 Container format The container format of the mobility data marketplace is an XML data exchange format that is defined using an XML Schema Definition (XSD). It is divided into the area of MDM platform-specific information (header element) and the payload area (body element). This format definition allows to carry any structured traffic data by using the MDM platform. Figure 1: Overview Container Model In the header element the container format includes - depending on the type of use - the ID of the publication under which the data is made available to the MDM platform, or the ID of the subscription under which the data are sent to the data client. Furthermore, the header element optionally contains digital signatures and timestamps for the included payload. In the container format, exactly one header element is permitted. The payload is stored in the body element of the container. In order to keep the model flexible, the format and content of the body element is not specified. The children of the body element contain an additional mark of the content type. In a container, there is exactly one body element. Thus, not only data in XML format can be transported in containers, but also binary data. It is also possible to transport more than just one data packet (i.e. several children in the body element) in a container using this model. Page 2

2.1 Construction of the container header The metadata for the transmitted payload is stored in the header element. The structure of this information is based on the [WS Security Core Specification 1.1] for the construction of a SOAP header. The header includes elements consisting of information about the data origin, the validity and the signature of the payload. In addition, a status code can be transmitted. The origin of a message is characterized by the publication ID under which the publication of the data supplier is registered, or the subscription ID under which the subscription of the data client is registered. The elements on the validity and the signature of the data packets may occur 0 to n times. If multiple data packets are contained in the body, each package can then be provided with a validity and a signature. For detailed information, please refer to chapter 2.2. Page 3

Figure 2: Container model - Header Element Structure Page 4

Figure 3: Construction Timestamp Element The timestamp element is part of the OASIS specification [WS Security Core Specification 1.1] of the OASIS standard 1.1 and defines the time of creation as well as the validity period of data. Page 5

Figure 4: Structure of the signature element The signature element is also part of the OASIS specification [WS Security Core Specification 1.1] of the OASIS standard 1.1 and defines the originator of the payload. In addition, the signature ensures that the payload has not been manipulated (data integrity). If the element exists, only the value "OK" will be allowed as status code in version 1.0. Other status codes may be supplemented in future releases. The encryption of the message content is not provided, as the message is sent SSLencrypted across the entire route of transmission. An asymmetric encryption of the message content is not useful, as it would require an extensive key management from the MDM platform, to enable the data suppliers, when creating and sending a data packet to the platform, to identify the public keys of the data clients. Within the MDM platform, it must be assumed that the data is made available to authorized data clients only. Page 6

Information Identifier Description Contains information to identify the origin of data Publication ID Subscription ID Validity Information on the validity period of data Date and time of creation Date and time of expiry Reference to the data for which the validity is determined Signature Information on the signature of data Type of signature Reference to the signed data Status For transferring a status code Table 1: Structural information in the container model 2.2 Construction of the container body In a container, there is exactly one body element. Below this element, as many xml and binary elements can be grouped. They host the actual payload. Page 7

Figure 5: Structure of the XML element If the payload is provided in an XML-based format, they will then be installed below the XML element. The scheme attribute makes reference to an XSD schema belonging to the XML structure. This XSD schema can be used to validate the data. The id attribute assigns the payload to a unique ID that is referenced by the header elements timestamp and signature. Figure 6: Structure of the binary element If the payload is provided as binary data, the latter will be installed under the binary element in BASE64-encoded form. The type attribute indicates the type of data. The id attribute assigns the payload to a unique ID that is referenced by the header elements timestamp and signature. Page 8

Type base64binarydatex2 base64binaryots2 hexbinary Todo Description Base64-encoded data according to [DatexIISchema]. Base64-encoded data according to Open Transport System 2. Binary data in hexadecimal notation. The type of data must be part of the coded data. Placeholder for further formats Table 2: Characteristics type attribute V1.0 A signature and a validity that are defined in the header element may belong to each of the xml and binary elements. For this purpose, the corresponding XML / binary element is assigned an ID that is referenced in the signature / timestamp element of the header. Page 9

If the entire content of the body element is provided with a signature or a validity, it must be encoded by using the ID "body" in the header elements. The body element itself must then be assigned no ID. Figure 7: Container model - Body Element Structure Page 10

2.3 XML example The example shows a container with two data packets in the body and a header with a time stamp for the entire body. All information is fictional. <?xml version="1.0" encoding="utf-8" standalone="yes"?> <ns3:container xmlns:ns1="http://schemas.xmlsoap.org/ws/2002/07/utility" xmlns:ns2="http://www.w3.org/2000/09/xmldsig#" xmlns:ns3="http://ws.bast.de/container/trafficdataservice"> <ns3:header> <ns3:identifier> <ns3:publicationid>1734007</ns3:publicationid> </ns3:identifier> <ns1:timestamp ns1:id="body"> <ns1:created>2014-01-20t12:28:01.874z</ns1:created> <ns1:expires>2014-01-27t12:28:01.874z</ns1:expires> </ns1:timestamp> </ns3:header> <ns3:body> <ns3:binary type="base64binarydatex2" id="b1"> H4sIAAAAAAAAAN19245dx5HluwH/A8EXPwxCjMiMvBVkNfI604A1Y0xrBvM2oMWymmiKNCi6bf/9 RBYtdW225e4d3EzmHMOWi6oL1z61TtxjxZf/8OfvXz351/u3P7x88/rXv6Iv8FdP7l9/++bFy9ff /fpx/+ubaffx//dvl3/x5qvzmzffvfz2+auv37y4f/vevuv1d79++s/v3v3h7tmz79/98c//+pr3 b95+//yd/jxnp3z7z/ffp3+gbpo/+psxv3j/dxd//uhlt9/0pz/96ys/2s/evp3umugkz//n69/8 08P3wcvXP7x7/vrbe/k++Ya79z/tN2++ffjh/9m/9Mn44/2r3759+e39b//4u1cv33 </ns3:binary> <ns3:binary type="base64binarydatex2" id="b2"> RBYtdW225e4d3EzmHMOWi6oL1z61TtxjxZf/8OfvXz351/u3P7x88/rXv6Iv8FdP7l9/++bFy9ff H4sIAAAAAAAAAN19245dx5HluwH/A8EXPwxCjMiMvBVkNfI604A1Y0xrBvM2oMWymmiKNCi6bf/9 /fpx/+ubaffx//dvl3/x5qvzmzffvfz2+auv37y4f/vevuv1d79++s/v3v3h7tmz79/98c//+pr3 08P3wcvXP7x7/vrbe/k++Ya79z/tN2++ffjh/9m/9Mn44/2r3759+e39b//4u1cv33/z//3XHz/9 b95+//yd/jxnp3z7z/ffp3+gbpo/+psxv3j/dxd//uhlt9/0pz/96ys </ns3:binary> </ns3:body> </ns3:container> Page 11