Processes, data elements and documents in commerce, industry and administration — Trusted communication platforms for electronic documents — Part 1: Fundamentals

This document defines the requirements about trusted communication in legal, administrative and technical considerations. This document shows a TCP system architecture to guarantee trusted communication and promote trusted services by providing trusted communication evidence as the proof. This document focuses on TCP at the view of 7th application layer of OSI (Open Systems Interconnection) Reference Model. The audiences are the policy makers for IT innovation such as dematerialization, legal experts regarding electronic activities, IT planners for single windows and secure transactions, IT service providers related to distributed networking and ledger, trusted system auditors, trusted communication concerned parties and so on.

Processus, éléments d'informations et documents dans le commerce, l'industrie et l'administration — Plates-formes de communication sécurisées pour documents électroniques — Partie 1: Généralités

General Information

Status
Published
Publication Date
29-Mar-2020
Current Stage
9093 - International Standard confirmed
Start Date
25-Jun-2025
Completion Date
13-Dec-2025
Ref Project
Standard
ISO 19626-1:2020 - Processes, data elements and documents in commerce, industry and administration -- Trusted communication platforms for electronic documents
English language
36 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)


INTERNATIONAL ISO
STANDARD 19626-1
First edition
2020-03
Processes, data elements and
documents in commerce, industry
and administration — Trusted
communication platforms for
electronic documents —
Part 1:
Fundamentals
Processus, éléments d'informations et documents dans le commerce,
l'industrie et l'administration — Plates-formes de communication
sécurisées pour documents électroniques —
Partie 1: Généralités
Reference number
©
ISO 2020
© ISO 2020
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address
below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Fax: +41 22 749 09 47
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO 2020 – All rights reserved

Contents Page
Foreword .iv
Introduction .v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Trusted communication. 4
4.1 Overview . 4
4.2 Legal considerations . 5
4.2.1 General. 5
4.2.2 Certainty of communication . 6
4.2.3 Completeness of communication delivery . 7
4.2.4 Confidentiality of communication delivery . 7
4.3 Administrative requirements . 8
4.3.1 General. 8
4.3.2 Trusted communication platform service provider (TCPSP) . 8
4.3.3 TCP main agreement . 8
4.3.4 TCP client agreement . 9
5 Trusted communication platform (TCP) .10
5.1 Overview .10
5.2 TCP system architecture .11
5.3 TCP system requirements .12
5.3.1 General.12
5.3.2 TCP confidentiality .12
5.3.3 TCP authenticity .13
5.3.4 TCP reliability .13
5.3.5 TCP accountability .14
5.3.6 TCP portability .14
5.4 TCP system rules .15
5.5 TCP communication.15
5.5.1 TCP communication overview .15
5.5.2 Secure envelope .17
5.5.3 TCP message package .18
5.5.4 TCPSPs’ communication binding .19
6 Trusted communication evidence (TCE) .21
6.1 TCE generation .21
6.2 Evidential procedure .23
6.3 TCE custody .24
6.3.1 General.24
6.3.2 TCE Generation .24
6.3.3 Validation about TCE .25
6.3.4 Archiving of TCE .26
Annex A (informative) Trusted communication reference model .28
Annex B (informative) TCP main: quality and risk management .29
Annex C (informative) TCPSPs’ communication binding (an example) .31
Bibliography .35
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards
bodies (ISO member bodies). The work of preparing International Standards is normally carried out
through ISO technical committees. Each member body interested in a subject for which a technical
committee has been established has the right to be represented on that committee. International
organizations, governmental and non-governmental, in liaison with ISO, also take part in the work.
ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of
electrotechnical standardization.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the
different types of ISO documents should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www .iso .org/ directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of
any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www .iso .org/ patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the
World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see www .iso .org/
iso/ foreword .html.
This document was prepared by Technical Committee ISO/TC 154, Processes, data elements and
documents in commerce, industry and administration.
A list of all parts in the ISO 19626 series can be found on the ISO website.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www .iso .org/ members .html.
iv © ISO 2020 – All rights reserved

Introduction
Amidst the big flow of openness and integration in the world’s economy, ICT (information &
communications technology) is used as a means for innovation in productivity and connectivity. Since
the value chain of products and services gets enlarged globally, business collaborations need electronic
communications to be secure in an open and distributed environment. In this sense, electronic
documents are asked for as a proof of business communications, meanwhile legal evidence or legal
force is required.
However, it can be difficult to recognize electronic documents as the original source. There exist cases
where many processes rely only on paper documents, even though electronic documents are widely
implemented in business processes. However, the reality is that even if electronic documents are
properly communicated in business transactions, the final data output may be on paper and stored in
the form of printed copies as legal evidences for a long-term period. As such, this coexisting environment
of electronic documents and paper documents causes breakup of the value chain, resulting in sluggish
productivity, inefficiency, cost increase and offset of the benefit obtainable from the ICT. To improve
these situations, therefore, it is essential to draw out a dematerializing solution that can guarantee the
trustworthiness of electronically communicated document given legal evidence.
A dematerializing solution should meet with legal considerations about electronically communicated
documents. However, this solution is not easy, because electronic communication itself includes the
uncertainties from network failure and the electronic document itself is insufficient in safeguarding the
integrity during its lifecycle. In the meantime, the problem due to repudiation, inadvertent disclosure
or tamper has been regarded too sensitive to finalize the dematerialization solution related to business
transactions as well as diverse governmental services, because it can protentially be embroiled into
legal dispute or conflicts.
This document focuses on how to enhance trusted communication in an open and distributed
environment. The trusted communication means electronic communication can ensure integrity and
non-repudiation of electronic transactions by a trusted third party in a dematerialization manner
under the guidance of UNCITRAL (United Nations Commission on International trade Law). For this
open and distributed environment, at first, it should be able to minimize some innate difficulties
around dematerialization. To solve these difficulties, this document approaches a solution by forming
the trusted third party oriented and mutually trusted relationship among concerned stakeholders and
implementing a shared platform which is accountable and traceable. In detail, a trusted communication
platform needs to be able to keep the evidence about electronically communicated documents in a
reliable and trustworthy manner. To achieve that, a new approach is required because the existing ICT
environment has some limits for the trusted communication in the following aspects;
— Although an EDI (electronic data interchange) transaction can provide legal evidence about
interchanged electronic documents according to the EDI syntax rule, it has limitations allowed
only on closed users of EDI network and pre-defined processes of EDI semantics. And in the case
of Internet, no matter what business transactions are securely communicated, it is difficult to
recognize the legitimacy of communications carried out in other authentication sytems. In this sense
this document sets up a refined dematerializing process allowable under the open and distributed
ICT environment, which is applicable to the trusted communication like electronic trade, electronic
administration, e-business and so on.
— The security technology has been used as a core technology for secured electronic documents.
However, it is not enough to maintain the dematerialization of electronic documents, because the
integrity is easy to be broken in the aspect of the valid period of security. In this sense this document
brings up a new way that can secure the authenticity of the trusted communication evidence for a
long period of time needed as legal evidences.
— IT services under an open environment can not easily identify the originality of electronic
communications by accounting for the communication context, that is originator, addressee(s),
communication time and so on. Regarding the uncertainties such as modification, falseness or
bleach over electronically communicated documents, it is not easy to identify and ask for whose
liability it is among multiple stakeholders. Moreover, if the blockchain are to be applied across the
supply chain, there is a need of trusted communication for seamless connectivity. In this sense,
this document can make business transactions accountable and reliable and consequently promote
trusted IT services.
An evidence generated via a trusted communication platform can account for the truth of
e-communication activities and facilities trusted communication services.
vi © ISO 2020 – All rights reserved

INTERNATIONAL STANDARD ISO 19626-1:2020(E)
Processes, data elements and documents in commerce,
industry and administration — Trusted communication
platforms for electronic documents —
Part 1:
Fundamentals
1 Scope
This document defines the requirements about trusted communication in legal, administrative and
technical considerations. This document shows a TCP system architecture to guarantee trusted
communication and promote trusted services by providing trusted communication evidence as the proof.
th
This document focuses on TCP at the view of 7 application layer of OSI (Open Systems Interconnection)
Reference Model.
The audiences are the policy makers for IT innovation such as dematerialization, legal experts regarding
electronic activities, IT planners for single windows and secure transactions, IT service providers
related to distributed networking and ledger, trusted system auditors, trusted communication
concerned parties and so on.
2 Normative references
There are no normative references in this document.
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
ISO and IEC maintain terminological databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at https:// www .iso .org/ obp
— IEC Electropedia: available at http:// www .electropedia .org/
3.1
addressee
identifiable party (3.12) or destination which is intended by the originator to receive the electronic
communication (3.5), but does not include a TCPSP (3.20) acting as an intermediary with respect to that
trusted communication (3.21)
Note 1 to entry: This definition is adapted from UNCITRAL 2007, United Nations Convention on the Use of
Electronic Communications in International Contracts.
3.2
audit
procedure to verify whether a product, a process or a system conforms to socially accepted criteria or
standards
3.3
communication
statement, declaration, demand, notice or request, including an offer and the acceptance of an offer, that
the parties are required to make or choose to make in connection with the formation or performance of
a contract
Note 1 to entry: This definition is adapted from UNCITRAL 2007, United Nations Convention on the Use of
Electronic Communications in International Contracts.
3.4
dematerialization
movement of paper proofs into electronic proofs by the evidential system which can capture the
evidence of communications and verify that it is trusted communication (3.21)
3.5
electronic communication
communication that the parties make by means of electronic documents
Note 1 to entry: This definition is adapted from UNCITRAL 2007, United Nations Convention on the Use of
Electronic Communications in International Contracts.
3.6
entity
subject who intends to communicate using electronic documents in a trusted manner in the real world
3.7
non-repudiation of delivery
NRD
state of affairs that a TCPSP (3.20) provides the originator of the message with evidence that the
message has beed delivered
Note 1 to entry: See ISO 9735-5 and ISO/IEC 13888-1.
3.8
non-repudiation of origin
NRO
state of affairs that guard against the originator of a message falsely denying having sent the message
Note 1 to entry: See ISO 9735-5 and ISO/IEC 13888-1.
3.9
non-repudiation of receipt
NRR
state of affairs that guard against the recipient of a message falsely denying having received the message
Note 1 to entry: See ISO 9735-5 and ISO/IEC 13888-1.
3.10
non-repudiation of submission
NRS
state of affairs that a TCPSP (3.20) provides the originator of the message with evidence that the
message has been submitted for delivery to the recipient
Note 1 to entry: See ISO 13888-1.
2 © ISO 2020 – All rights reserved

3.11
originator of communication
identifiable party (3.12) or destination by which, or on whose behalf, the electronic communication (3.5)
has been sent or generated prior to storage, if any, but it does not include a TCPSP (3.20) acting as an
intermediary with respect to that trusted communication (3.21)
Note 1 to entry: This definition is adapted from UNCITRAL 2007, United Nations Convention on the Use of
Electronic Communications in International Contracts.
3.12
party
person or organization that participates in a transaction as a direct stakeholder
3.13
TCP accountability
state of being capable of explaining the fulfilment of trusted communication (3.21)
Note 1 to entry: See ISO 7498-2, ISO 9735-5, ISO/IEC 13888-1, ISO 15489, ISO 16175-3 and ISO 17068.
3.14
TCP authenticity
quality of being real or true about e-communication.
Note 1 to entry: The deinition is adapted from IETF RFC 6818.
3.15
TCP communication client
system component which performs the related functions by the communication request of an entity
(3.6) under the TCP (3.23) system
3.16
TCP communication server
system component which performs transmission and reception of e-documents by acting as an agency
of the TCP communication client (3.15) to generate the evidence
3.17
TCP confidentiality
quality of keeping an electronic document confidential, without any leakage, while delivering the
e-documents
3.18
TCP reliability
quality of being able to make certain guarantees about the successful transmission of the message for
trusted communication (3.21)
3.19
TCP portability
state or quality of being transportable with other application system in an open system environment
3.20
TCP service provider
TCPSP
service provider or trustee (3.25) that operates TCP communication server (3.16) and client and plays the
role and responsibility about TCP (3.23) service by complying with related regulations, requirements
and/or technical standards
3.21
trusted communication
highly qualified electronic communication (3.5) including a secure, accountable and reliable transfer
of electronic documents for the purpose of dematerialization (3.4) in the distributed business
environments, by meeting legal considerations like certainty, completeness and confidentiality of
communication
3.22
trusted communication evidence
TCE
evidence record captured from trusted communication (3.21)
3.23
trusted communication platform
TCP
service platform enabling trusted communications (3.21) for exchanging electronic documents on legal
liability by an open architecture on an open network
3.24
trusted third party
TTP
highly qualified person or body that is recognized as being independent and neutral from the parties
involved, as concerns the issue in question
Note 1 to entry: See ISO 17068.
3.25
trustee
person or organization to whom legal title to a property is entrusted to use for another’s benefit
3.26
truster
supporter who accepts something as true
3.27
trustworthiness
quality of being dependable and reliable
Note 1 to entry: See ISO 17068.
4 Trusted communication
4.1 Overview
In the open Internet, to secure paperless communications and works, it is essentially required to foster
the trust. A trusted communication shall be able to guarantee the equality of paper-based documents
or works and the legality about electronic communications and contracts.
The method of electronic communication is not sufficient to promote paperless communications
and works. Even though an electronic method transfers electronic documents, its paper copy can be
preferred as a source of evidence during the legal retention period.
At this aspect, UNCITRAL formulates some legislative guidelines to facilitate the use of electronic
communications in international contracts. It declares the non-differentiation principle about the
electronic and the paper form and then provides the legal requirements of the writing, the signature
and the original form for electronic communication.
Paperless communication can be activated in the case of ensuring the authenticity of electronic
documents related to communication. However, in an open Internet, different types of authentication
technology can cause the dematerialization problem due to the interoperability. Any probable risks
4 © ISO 2020 – All rights reserved

and uncertainty also can be the obstacles for dematerialization. Therefore, it is necessaty to set up a
qualified and trustworthy level for identifying the legal value for trusted communication.
Trusted communication can prove that its electronic document is a source of its communication
evidence. In this sense, trusted communication provides a way of guaranteeing the quality of electronic
communication and its proof verification system legally and technically. Trusted communication should
also be applied to evidence based technogy such as blockchain.
Figure 1 — Overview of a trusted communication
Figure 1 shows the trusted communication can be legally admitted by providing trusted communication
evidence (TCE) which is composed of the non-deniable evicence of its origin and delivery. First, non-
repudiation of origin (NRO) is the proof of the fact that all identies of communication originator and
recipient(s) are authenticated/authorized in order to deliver e-documents (including originator’s
intention) in distributed environment. Non-repudiation of delivery (NRD) is evidence that the
e-documents have been completely delivered from the originator to the addressee in the end-to-
end communication. On the other hand, communication participants (or entities) includes machines
as well as people like in Figure 1. In this regard, this document provides the TCP to ensure trusted
communication and respond to any legal disputes and new technology changes.
4.2 Legal considerations
4.2.1 General
A communication is transmitted from the originator to the addressee. However, in the case of electronic
communication, it delivers the electronic documents from the originator to the addressee and is
executed in electronic transaction by the intermediary. This electronic transaction is a basic function in
a business system which is either of simple type (such as e-mail systems) or complex type (many kinds
of business systems or EDI including negotiation of contract, international transaction or e-government
related works and so on).
However, there is a gap between electronic communication and legal definition. The term
”communication” is defined by UNCITRAL as "any statement, declaration, demand, notice or request,
including an offer and the acceptance of an offer, that the parties are required to make or choose to make
in connection with the formation or performance of a contract”, whereas ”electronic communication”
is referred to as only ‘its electronic means’. The legal group ascertains the factual existence and
the content of communication between the parties in the context of formation of a contract. On the
other hand, the technical group views actions of transmitting or receiving messages as proofs for
transmission transactions. For example, ISO 8583-1 and ISO 20022-6 define electronic transaction as
“an action of sending or receiving messages via an information communication network”.
This definitional gap causes disagreement about dematerialization. It means that even technically
successful e-document cannot be easily admitted as a legal source about that transaction after passing
a long term. The reason is that the electronic document has weak property to prove an original source
through the successful communication. In order to remove this gap, electronic communication needs to
provide its evidence which can be approved at legal aspects.
Therefore, this document sets up the requirements for the evidence of communication which shall be
able to be approved at legal aspects. The following three requirements shall be met to fulfil trusted
communication from legal aspects;
— the certainty of communication — whether an electronic communication is factually and certainly
executed from/to communication partners;
— the completeness of communication — whether an electronic communication is successfully and
completely executed by the intermediaries;
— the confidentiality of communication — whether an electronic communication is securely and
confidentially executed from end to end.
These requirements provide a necessary and sufficient condition for fulfilling trusted communication.
Herewith an evidence for meeting these requirements can be useful to provide legal admissibility.
4.2.2 Certainty of communication
In order to guaranttee the certainty of communication at legal aspects, its evidence can be duly
approved that the communication parties and their business context are factual. To accomplish this,
electronic communication methods shall be reliable and appropriate for the purpose for which the
electronic communication was generated, or shall be proven to have fulfilled the function of identity and
intention, either independently or together with other evidences. Therefore, trusted communication
can include the following requirements for legal admissibility.
(1) Certainty about communication parties
In the case of non-face to face communication, it is important to confirm that communication parties
are the very same persons and their communication contents have the very same own intentions in the
communication context. In order to guarantee the certainty of communication parties, the evidence
shall be able to capture the information of their authenticated identities like the following:
— Communication parties should be identifiable and authenticable that they shall be the right persons
and their access should be authorized.
These methods or technologies are various for guaranteeing the certainty of communication parties.
However, for a trusted communication, the authentication technology shall be recommended to use the
same one or the mutually recognized one.
(2) Certainty about time and place
Trusted communication should be able to verify the fact of having been executed like the following:
— time of dispatch (leaving): time at which the sender has sent a message;
Time information shall be adjusted and synchronized to the UTC (coordinated universal time) for
protecting probable dispute about transmission.
— time of receipt: time at which the recipient has received the message;
In case of communication transfer error (that is, the communication message is in a state of being
left in an electronic communication system, not having been sent to the destination), time of receipt
shall be considered acceptable.
6 © ISO 2020 – All rights reserved

— place at which the communication parties conduct business;
In general, the place designates the (physical or logical) location of the communication partners.
Whereas, in the case of communication delivery, the place of intermediaries shall be considered
together.
(3) certainty about communicated contents
The intentions of communication parties are represented in communication contents. Therefore, the
integrity of the original form intended and written by parties should be verified as follows:
— about communication content which is created and signed by the originator of communication
through a communication transaction;
NOTE A digitally signed document, in general, is an example of this. However, if without a signature,
capturing information in a forensic way at transmission time can be considered as an evidence.
— about original form which can guarantee the authenticity and the integrity.
The integrity information such as hash value shall be captured and archived. This evidence is very
useful to validate the custody of chain and trusted communication.
4.2.3 Completeness of communication delivery
It is generally approved that the intermediary can transfer or deliver electronic documents on behalf
of communication partners (or clients). An intermediary should transfer and receive electronic
documents under certain communication context to others. However, communication errors can occur
from anywhere. On the other hand, some risks can come from the communication partner. Although an
intermediary keeps its own logs, it can be difficult to confirm its completeness to the clients in the case
of distributed communication systems like business supply chains. Therefore, trusted communication
needs an intermediary to guarantee the completeness of its communication.
In order to verify the completeness of communication, all communication sections in distributed
networks should provide the evidence about fulfilment of end-to-end communications. Also, its
completeness should be able to be accepted by all participants of the communication, avoiding legal
disputes.
From this perspective, the confirmation of the completeness can be shown as non-repudiation about
the fulfilment of communication delivery by using digital signatures like followings;
— non-repudiation of origin (NRO);
— non-repudiation of submission (NRS);
— non-repudiation of reciept (NRR);
— non-repudiation of delivery (NRD).
4.2.4 Confidentiality of communication delivery
When the intermediary implements electronic communication, the confidentiality of its communication
from end to end shall be ensured. Communication delivery should meet the following confidential
requirements:
— The intermediaries shall transfer communication contents with encryption from the originator of
communication (end) to the addressee (end). The content of communication shall be encrypted so
that the communication information cannot be opened to others by any intermediary.
An originator can prefer to transfer his communication contents without encryption. But the
intermediary shall transfer them with encryption.
— The intermediaries should protect the sensitive information such as personal information
about communication parties. During or after transaction, their personal information should be
protected from any infringement, violation or hacking etc. After completion of communication, the
intermediary should protect the information from any unauthorized perusal and/or access to the
content of communication.
4.3 Administrative requirements
4.3.1 General
An open and distributed environment is interlinked with a variety of business works, different services
or diverse ICT environments. There are lots of interlinked and distributed communication systems such
as single windows, supply chains, cross-borders, cross-industries and government projects, etc. This
diversity can create the limitation in binding a chain of trust and introduce the problem of paperless
communication. In this aspect, the trusted communication needs more managerial requirements in
addition to the technical requirements in order to manage the trusted value chain among multiple
service providers.
4.3.2 Trusted communication platform service provider (TCPSP)
TCPSP is a service provider that should mediate e-communications securely from the communication
originator to recipient(s) concerned in the distributed environment such as registered e-mail service,
cloud service or many kinds of service platforms. It is responsible for trusted communication in
compliance with legal and technical requirements.
In the trusted communication, TCPSP shall be neutral, professional and responsible, and should provide
trustworthy communicaton service as TTP (trusted third party), even in cross-border business and/or
complex communication. In this sense, a TCPSP needs to reinforce the chain of trust among internal and
external clients, as well as other TCPSPs (see Annex A). To do so, TCPSPs should maintain agreements
needed for trusted communication.
As shown in Figure 2, a TCPSP (communication server) can play the role of a bridge between its client
(communication client) and relying TCPSP (relying communication server). This means that TCPSP
should reach two agreements such as “TCP main” and “TCP client”.
Figure 2 — TCPSP’s role in trusted communication
4.3.3 TCP main agreement
”TCP main” is a mutual agreement between TCPSPs for the purpose of interoperability and quality
under regulatory, technical condition or any economic community. It can formalize the qualified
assured partnership and inter-connect trusted communication with TCPSPs.
8 © ISO 2020 – All rights reserved

“TCP main” can include agreements about policy, system, conformance, quality and risk. According to
the change of business requirements, new technology and regulation, “TCP main” can be modified by
regular agreements between TCPSPs. The followings are major “TCP main” issues to be considered.
(1) Policy requirements
— ownership of TCE,
— security policy to is applied to electronic document(s) and their transmission, including
authentication, digital signature, cryptographic algorithm, key exchange and key management,
— confidentiality policy and management rule in end-to-end communication including secret
key(s) management, encryption, enveloping, private information and legal liability,
— e-record policy including forensic capture, generation, retention and disposition of NRO, NRS,
NRD, NRR, TCE(s) and e-documents, and
— other managements or actions.
(2) System management
— security facilities, secured storage, network security and functionality,
— system performance and load balancing,
— identity directory, distributed technology for sharing or federated e-identity directory and
interconnection of other application systems or cloud services, and
— secured and reliable messaging and communication binding protocol and its interoperability.
(3) Conformance management
— testbed for interoperability between service providers, and
— portability to business service etc.
(4) Risk and quality management (see Annex B)
— risk management including role and responsibility and actions, and
— quality management including regular monitoring and auditing(tracking).
“TCP main” can be agreed in various common features depending on the communication social
environment (national or economic community, etc.). However, due to limitations related to regional
policy or different legacy systems, “TCP main” should apply open and secure technology and enhance
the interoperability by adopting the following:
— technical interoperability guideline, and
— international standard.
4.3.4 TCP client agreement
“TCP client” means the mutual agreements between the TCPSP and its clients. It guarantees the
partnership with the client. The TCPSP and the client should have an agreement such as a contract or
SLA (service level agreement). The following are major “TCP client” issues to be considered:
— ownership about the client’s original communication,
— availability of TCE about the client’s original communication,
— confidentiality policy about privacy protection and legal liability,
— retention policy about TCE and e-document and legal liability,
— if necessary, key consignment policy, and,
— other managerial services.
5 Trusted communication platform (TCP)
5.1 Overview
For the purpose of legal liability, TCP should provide non-repudiation evidences with neutral and
expertised involvement and include following features:
— it should include evidential functionality related to the cross confirmation of e-identities about
originator and recipient, hash values of e-documents about before communication and after
communication, receipt and TCEs about transmitting server and receiving server;
— it should include e-delivery functionality including evidential procedure to collect, generate and
store it during the communication process.
In the real world, TCP types can be diverse, depending on whether it includes communication binding
or not. Its simple type refers to mail delivery such as REM (registerd electronic mail) and its complex
type supports business communication such as ERDS (electronic registered delivery service), supply
chain services and so on.
NOTE 1 Complex communication includes the four-corner model which has multiple TCPSPs, fulfilling cross-
border business transactions, trade, supply chains, healthcare, e-government services and so on.
The complex type involves the communication binding of multiple TCPSPs and needs to map some
technologies such as security, distributed computing, record technology and the system interoperability.
In this view, a technical reference model shows the technology map regarding TCP in Figure 3.
NOTE 2 Distributed computing technology such as cloud computing is defined as a model in which components
located on networked computers communicate and coordinate their action by passing messages. This model is
given in ISO/IEC 19941.
Figure 3 — TCP technical reference model
As shown in Figure 3, TCP's key functions are summarized as TCP communication e-delivery, TCP
identity directory (including authentication and authorization function) and TCP evidence repositoty
(including evidence custody). Security technology such as authentication (including signature,
10 © ISO 2020 – All rights reserved

biometrics and etc) and cryptography (including encryption, hash, MAC and etc) is integrated into the
communication network's transport layer and message layer in the process of e-communication and
applied to them. Distributed computing technology is also applied to link with the application system
and/or to access and share identity, metadata and evidence by using the application interface [including
APIs (application programming interface)]. In addition, records technology is applied to capture,
generate and store TCE by using the security technology (including non-repudiation). Thus, TCP can
be regarded as a convergence technology that is a fusion of e-communication technology, security
technology, records technology and distributed computing technology.
5.2 TCP system architecture
A TCP system in a distributed communication environment can fulfill end-to-end communication
between its system components. TCPSP communication server must authenticate the identities of
communication entities in a trustworthy manner and fulfil trusted communications without any
communication error and networking failures by generating TCE. In this respect, TCP seems to be
closely related to the communication funcationality in case of authorized P2P communication or private
blockchain.
Figure 4 shows the TCP system architecture. The TCP system model consists of a pair of secured and
interoperable communication systems (including each server and client) and two kinds of directories for
identity and evidence. At this point,
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...