{"id":344348,"date":"2024-10-20T00:11:02","date_gmt":"2024-10-20T00:11:02","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iec-60839-11-52020\/"},"modified":"2024-10-25T23:32:57","modified_gmt":"2024-10-25T23:32:57","slug":"bs-en-iec-60839-11-52020","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iec-60839-11-52020\/","title":{"rendered":"BS EN IEC 60839-11-5:2020"},"content":{"rendered":"
IEC 60839-11-5:2020 specifies the Open supervised device protocol (OSDP) for electronic access control systems. This includes communication settings, commands and replies between the ACU and the peripheral devices. It also includes a mapping of mandatory and optional requirements as per IEC 60839-11-1:2013 as covered by Annex. This document applies to physical security only. Physical security prevents unauthorized personnel, attackers or accidental intruders from physically accessing a building, room, etc.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | Annex ZA(normative)Normative references to international publicationswith their corresponding European publications <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 1 Scope 2 Normative references 3 Terms, definitions and abbreviated terms 3.1 Terms and definitions <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 3.2 Abbreviated terms 4 Overview Figures Figure 1 \u2013 Schematic overview of an OSDP connection <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5 Communication settings 5.1 Physical interface 5.2 Signaling 5.3 Character encoding 5.4 Channel access 5.5 Multi-byte data encoding <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.6 Packet size limits 5.7 Timing 5.8 Message synchronization <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.9 Packet format Tables Table 1 \u2013 Packet format <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Table 2 \u2013 Message control information <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 5.10 Multi-part messages 5.10.1 General 5.10.2 Multi-part message usage rules Table 3 \u2013 The security block (SB) Table 4 \u2013 Multi-part message structure <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5.11 Smartcard handling Table 5 \u2013 Behaviour modes <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 6 Commands 6.1 General 6.2 Poll request (osdp_POLL) 6.3 ID report request (osdp_ID) Table 6 \u2013 Poll request <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 6.4 Peripheral device capabilities request (osdp_CAP) 6.5 Local status report request (osdp_LSTAT) 6.6 Input status report request (osdp_ISTAT) Table 7 \u2013 ID report request Table 8 \u2013 Peripheral device capabilities request Table 9 \u2013 Local status report request Table 10 \u2013 Input status report request <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 6.7 Output status report request (osdp_OSTAT) 6.8 Reader status report request (osdp_RSTAT) 6.9 Output control command (osdp_OUT) Table 11 \u2013 Output status report request Table 12 \u2013 Reader status report request <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 6.10 Reader LED control command (osdp_LED) Table 13 \u2013 Output control command Table 14 \u2013 Control code values <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Table 15 \u2013 Reader LED control command <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 6.11 Reader buzzer control command (osdp_BUZ) Table 16 \u2013 Temporary control code values Table 17 \u2013 Permanent control code values Table 18 \u2013 Color values <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 6.12 Reader text output command (osdp_TEXT) Table 19 \u2013 Reader buzzer control command (osdp_BUZ) <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 6.13 Communication configuration command (osdp_COMSET) Table 20 \u2013 Reader text output command (osdp_TEXT) Table 21 \u2013 Text command values <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 6.14 Scan and send biometric data (osdp_BIOREAD) Table 22 \u2013 Communication configuration command (osdp_COMSET) Table 23 \u2013 Scan and send biometric data (osdp_BIOREAD) <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 6.15 Scan and match biometric template (osdp_BIOMATCH) Table 24 \u2013 Biometric types Table 25 \u2013 Fingerprint formats <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 6.16 Encryption key set (osdp_KEYSET) 6.17 Challenge and secure session initialization request (osdp_CHLNG) 6.18 Server’s random number and server cryptogram (osdp_SCRYPT) 6.19 Manufacturer specific command (osdp_MFG) Table 26 \u2013 Command structure: 6-byte header followed by a variable length template <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 6.20 ACU receive size (osdp_ACURXSIZE) 6.21 Keep reader active (osdp_KEEPACTIVE) Table 27 \u2013 Manufacturer specific commands (osdp_MFG) Table 28 \u2013 ACU receive size (osdp_ACURXSIZE) Table 29 \u2013 Keep reader active (osdp_KEEPACTIVE) <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 6.22 Abort current operation (osdp_ABORT) 6.23 Get PIV data (osdp_PIVDATA) 6.24 General authenticate (osdp_GENAUTH) Table 30 \u2013 Abort current operation (osdp_ABORT) Table 31 \u2013 Get PIV data (osdp_PIVDATA) <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 6.25 Authentication challenge (osdp_CRAUTH) Table 32 \u2013 General authenticate (osdp_GENAUTH) fragment Table 33 \u2013 Authentication challenge (osdp_CRAUTH) fragment <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 6.26 File transfer command (osdp_FILETRANSFER) 6.27 Extended write data (osdp_XWR) 6.27.1 General Table 34 \u2013 File transfer command <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 6.27.2 Mode set command Table 35 \u2013 Extended write command structure Table 36 \u2013 Mode set command Table 37 \u2013 Mode 0 configuration Table 38 \u2013 Mode 1 configuration <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 6.27.3 Mode-00 read setting 6.27.4 Mode specific command codes for XRW_MODE=1 6.27.5 Mode-01 transparent content send request 6.27.6 Mode-01 connection done Table 39 \u2013 Read setting request Table 40 \u2013 Mode specific command codes Table 41 \u2013 Transparent content send request <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 6.27.7 Mode-01 request secure PIN entry command Table 42 \u2013 Smartcard connection done Table 43 \u2013 Request secure PIN entry command <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 6.27.8 Mode-01 smartcard scan 7 Replies 7.1 General Table 44 \u2013 Smartcard scan <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 7.2 General acknowledge \u2013 Nothing to report (osdp_ACK) 7.3 Negative acknowledge \u2013 Error response (osdp_NAK) Table 45 \u2013 General acknowledge (osdp_ACK) Table 46 \u2013 Negative acknowledge (osdp_NAK) <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 7.4 Device identification report (osdp_PDID) Table 47 \u2013 Error codes <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 7.5 Device capabilities report (osdp_PDCAP) Table 48 \u2013 Device identification report (osdp_PDID) Table 49 \u2013 Device capabilities report (osdp_PDCAP) <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 7.6 Local status report (osdp_LSTATR) 7.7 Input status report (osdp_ISTATR) 7.8 Output status report (osdp_OSTATR) Table 50 \u2013 Local status report (osdp_LSTATR) Table 51 \u2013 Input status report (osdp_ISTATR) <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 7.9 Reader tamper status report (osdp_RSTATR) 7.10 Card data report, raw bit array (osdp_RAW) Table 52 \u2013 Output status report (osdp_OSTATR) Table 53 \u2013 Reader tamper status report (osdp_RSTATR) <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 7.11 Card data report, character array (osdp_FMT) 7.12 Keypad data report (osdp_KEYPAD) Table 54 \u2013 Card data report, raw bit array (osdp_RAW) Table 55 \u2013 Card data report, character array (osdp_FMT) <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 7.13 Communication configuration report (osdp_COM) 7.14 Scan and send biometric data (osdp_BIOREADR) Table 56 \u2013 Keypad data report (osdp_KEYPAD) Table 57 \u2013 Communication configuration report (osdp_COM) <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 7.15 Scan and match biometric template (osdp_BIOMATCHR) 7.16 Client’s ID and client’s random number (osdp_CCRYPT) Table 58 \u2013 Scan and send biometric data (osdp_BIOREADR) Table 59 \u2013 Scan and match biometric template (osdp_BIOMATCHR) <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 7.17 Client cryptogram packet and the initial R-MAC (osdp_RMAC_I) 7.18 Manufacturer specific reply (osdp_MFGREP) 7.19 PD busy reply (osdp_BUSY) 7.20 PIV data reply (osdp_PIVDATAR) Table 60 \u2013 Manufacturer specific reply (osdp_MFGREP) Table 61 \u2013 PD busy reply (osdp_BUSY) <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 7.21 osdp_GENAUTHR 7.22 Response to challenge (osdp_CRAUTHR) Table 62 \u2013 PIV data reply (osdp_PIVDATAR) Table 63 \u2013 General authenticate response (osdp_GENAUTHR) <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 7.23 Manufacturer specific status reply (osdp_MFGSTATR) 7.24 Manufacturer specific error reply (osdp_MFGERRR) 7.25 File transfer status (osdp_FTSTAT) Table 64 \u2013 Response to challenge (osdp_CRAUTHR) Table 65 \u2013 Manufacturer specific status reply (osdp_MFGSTATR) Table 66 \u2013 Manufacturer specific error reply (osdp_MFGERRR) <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 7.26 Extended read reply (osdp_XRD) 7.26.1 General Table 67 \u2013 File transfer status (osdp_FTSTAT) <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 7.26.2 Mode specific reply codes for XRW_MODE=0 7.26.3 Mode-00 error reply (osdp_PR00ERROR) 7.26.4 Mode setting report (osdp_PR00REQR) Table 68 \u2013 Extended read reply Table 69 \u2013 Mode specific reply codes Table 70 \u2013 Error reply <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 7.26.5 Card information report (osdp_PR00CIRR) 7.26.6 Mode specific reply codes for XRW_MODE=1 Table 71 \u2013 Mode setting report Table 72 \u2013 Card information report Table 73 \u2013 Mode specific reply codes <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 7.26.7 Mode-01 NAK or error reply (osdp_PR01ERROR) 7.26.8 Card present notification reply (osdp_PR01PRES) 7.26.9 Transparent card data reply (osdp_PR01SCREP) Table 74 \u2013 Error reply Table 75 \u2013 Card present notification reply Table 76 \u2013 Transparent card data reply <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | 7.26.10 Secure PIN entry complete reply (osdp_PR01SPER) Table 77 \u2013 Transparent card data reply <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | Annex A (normative)Command and reply code numbers commands A.1 Commands Table A.1 \u2013 Commands code numbers <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | A.2 Replies Table A.2 \u2013 Replies code numbers <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | Annex B (normative)Function code definitions list B.1 General B.2 Function code 1 \u2013 Contact status monitoring Table B.1 \u2013 Function codes <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | B.3 Function code 2 \u2013 Output control B.4 Function code 3 \u2013 Card data format B.5 Function code 4 \u2013 Reader LED control <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | B.6 Function code 5 \u2013 Reader audible output B.7 Function code 6 \u2013 Reader text output B.8 Function code 7 \u2013 Time keeping B.9 Function code 8 \u2013 Check character support <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | B.10 Function code 9 \u2013 Communication security B.11 Function code 10 \u2013 Receive bufferSize B.12 Function code 11 \u2013 Largest combined message size B.13 Function code 12 \u2013 Smart card support <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | B.14 Function code 13 \u2013 Readers B.15 Function code 14 \u2013 Biometrics B.16 Function code 15 \u2013 Secure PIN entry support B.17 Function code 16 \u2013 OSDP version <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | Annex C (normative)CRC definition <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | Annex D (normative)Encryption D.1 Encryption method: OSDP-SC D.1.1 General Table D.1 \u2013 SEC_BLK_TYPE assignment <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | D.1.2 Overview D.1.3 The process D.1.4 Secure channel session connection sequence (SCS-CS) <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | D.1.5 Communication during a secure channel session D.1.6 SCS_16 PD->ACU D.1.7 SCS_17 ACU->PD D.1.8 SCS_18 PD->ACU D.2 Commands D.2.1 Encryption key set (osdp_KEYSET) Table D.2 \u2013 Command structure: 2-byte header followed by variable length data <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | D.2.2 Challenge and secure session initialization request (osdp_CHLNG) D.2.3 Server’s random number and server cryptogram (osdp_SCRYPT) D.3 Replies D.3.1 Client’s ID and client’s random number (osdp_CCRYPT) Table D.3 \u2013 Command structure: 8-byte random number as the \u201cchallenge\u201d Table D.4 \u2013 Command structure: 16-byte server cryptogram <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | D.3.2 Client cryptogram packet and the initial R-MAC (osdp_RMAC_I) D.4 Algorithms and support functions D.4.1 Session key derivation D.4.2 Key diversification Table D.5 \u2013 Command structure: 32-byte structure Table D.6 \u2013 Command structure: 16-byte structure <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | D.4.3 Client cryptogram D.4.4 Server cryptogram D.4.5 Padding D.5 Message authentication code (MAC) generation D.5.1 General <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | D.5.2 The wrap operation for security block types SCS_15, SCS-16, SCS_17, and SCS_18 Figure D.1 \u2013 MAC algorithm <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | D.5.3 The unwrap operation D.6 Error recovery D.7 Field deployment and configuration <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | Annex E (normative)Test vectors <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | Annex F (informative)Mapping of mandatory functions in IEC 60839-11-1 <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | Table F.1 \u2013 Access point interface requirements <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | Table F.2 \u2013 Indication and annunciation requirements <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | Table F.3 \u2013 Recognition requirements <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | Table F.4 \u2013 Duress signalling requirements Table F.5 \u2013 Overriding requirements <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | Table F.6 \u2013 System self-protection requirements (1 of 3) <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Alarm and electronic security systems – Electronic access control systems. Open Supervised Device Protocol (OSDP)<\/b><\/p>\n |