Shopping Cart

No products in the cart.

BS EN IEC 60839-11-5:2020

$215.11

Alarm and electronic security systems – Electronic access control systems. Open Supervised Device Protocol (OSDP)

Published By Publication Date Number of Pages
BSI 2020 92
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. Weā€™re here to assist you 24/7.
Email:[email protected]

IEC 60839-11-5:2020 specifies the Open supervised device protocol (OSDP) for electronic access control systems. This includes communication settings, commands and replies between the ACU and the peripheral devices. It also includes a mapping of mandatory and optional requirements as per IEC 60839-11-1:2013 as covered by Annex. This document applies to physical security only. Physical security prevents unauthorized personnel, attackers or accidental intruders from physically accessing a building, room, etc.

PDF Catalog

PDF Pages PDF Title
2 undefined
5 Annex ZA(normative)Normative references to international publicationswith their corresponding European publications
7 CONTENTS
13 FOREWORD
15 INTRODUCTION
16 1 Scope
2 Normative references
3 Terms, definitions and abbreviated terms
3.1 Terms and definitions
17 3.2 Abbreviated terms
4 Overview
Figures
Figure 1 ā€“ Schematic overview of an OSDP connection
18 5 Communication settings
5.1 Physical interface
5.2 Signaling
5.3 Character encoding
5.4 Channel access
5.5 Multi-byte data encoding
19 5.6 Packet size limits
5.7 Timing
5.8 Message synchronization
20 5.9 Packet format
Tables
Table 1 ā€“ Packet format
21 Table 2 ā€“ Message control information
22 5.10 Multi-part messages
5.10.1 General
5.10.2 Multi-part message usage rules
Table 3 ā€“ The security block (SB)
Table 4 ā€“ Multi-part message structure
23 5.11 Smartcard handling
Table 5 ā€“ Behaviour modes
24 6 Commands
6.1 General
6.2 Poll request (osdp_POLL)
6.3 ID report request (osdp_ID)
Table 6 ā€“ Poll request
25 6.4 Peripheral device capabilities request (osdp_CAP)
6.5 Local status report request (osdp_LSTAT)
6.6 Input status report request (osdp_ISTAT)
Table 7 ā€“ ID report request
Table 8 ā€“ Peripheral device capabilities request
Table 9 ā€“ Local status report request
Table 10 ā€“ Input status report request
26 6.7 Output status report request (osdp_OSTAT)
6.8 Reader status report request (osdp_RSTAT)
6.9 Output control command (osdp_OUT)
Table 11 ā€“ Output status report request
Table 12 ā€“ Reader status report request
27 6.10 Reader LED control command (osdp_LED)
Table 13 ā€“ Output control command
Table 14 ā€“ Control code values
28 Table 15 ā€“ Reader LED control command
29 6.11 Reader buzzer control command (osdp_BUZ)
Table 16 ā€“ Temporary control code values
Table 17 ā€“ Permanent control code values
Table 18 ā€“ Color values
30 6.12 Reader text output command (osdp_TEXT)
Table 19 ā€“ Reader buzzer control command (osdp_BUZ)
31 6.13 Communication configuration command (osdp_COMSET)
Table 20 ā€“ Reader text output command (osdp_TEXT)
Table 21 ā€“ Text command values
32 6.14 Scan and send biometric data (osdp_BIOREAD)
Table 22 ā€“ Communication configuration command (osdp_COMSET)
Table 23 ā€“ Scan and send biometric data (osdp_BIOREAD)
33 6.15 Scan and match biometric template (osdp_BIOMATCH)
Table 24 ā€“ Biometric types
Table 25 ā€“ Fingerprint formats
34 6.16 Encryption key set (osdp_KEYSET)
6.17 Challenge and secure session initialization request (osdp_CHLNG)
6.18 Server’s random number and server cryptogram (osdp_SCRYPT)
6.19 Manufacturer specific command (osdp_MFG)
Table 26 ā€“ Command structure: 6-byte header followed by a variable length template
35 6.20 ACU receive size (osdp_ACURXSIZE)
6.21 Keep reader active (osdp_KEEPACTIVE)
Table 27 ā€“ Manufacturer specific commands (osdp_MFG)
Table 28 ā€“ ACU receive size (osdp_ACURXSIZE)
Table 29 ā€“ Keep reader active (osdp_KEEPACTIVE)
36 6.22 Abort current operation (osdp_ABORT)
6.23 Get PIV data (osdp_PIVDATA)
6.24 General authenticate (osdp_GENAUTH)
Table 30 ā€“ Abort current operation (osdp_ABORT)
Table 31 ā€“ Get PIV data (osdp_PIVDATA)
37 6.25 Authentication challenge (osdp_CRAUTH)
Table 32 ā€“ General authenticate (osdp_GENAUTH) fragment
Table 33 ā€“ Authentication challenge (osdp_CRAUTH) fragment
38 6.26 File transfer command (osdp_FILETRANSFER)
6.27 Extended write data (osdp_XWR)
6.27.1 General
Table 34 ā€“ File transfer command
39 6.27.2 Mode set command
Table 35 ā€“ Extended write command structure
Table 36 ā€“ Mode set command
Table 37 ā€“ Mode 0 configuration
Table 38 ā€“ Mode 1 configuration
40 6.27.3 Mode-00 read setting
6.27.4 Mode specific command codes for XRW_MODE=1
6.27.5 Mode-01 transparent content send request
6.27.6 Mode-01 connection done
Table 39 ā€“ Read setting request
Table 40 ā€“ Mode specific command codes
Table 41 ā€“ Transparent content send request
41 6.27.7 Mode-01 request secure PIN entry command
Table 42 ā€“ Smartcard connection done
Table 43 ā€“ Request secure PIN entry command
42 6.27.8 Mode-01 smartcard scan
7 Replies
7.1 General
Table 44 ā€“ Smartcard scan
43 7.2 General acknowledge ā€“ Nothing to report (osdp_ACK)
7.3 Negative acknowledge ā€“ Error response (osdp_NAK)
Table 45 ā€“ General acknowledge (osdp_ACK)
Table 46 ā€“ Negative acknowledge (osdp_NAK)
44 7.4 Device identification report (osdp_PDID)
Table 47 ā€“ Error codes
45 7.5 Device capabilities report (osdp_PDCAP)
Table 48 ā€“ Device identification report (osdp_PDID)
Table 49 ā€“ Device capabilities report (osdp_PDCAP)
46 7.6 Local status report (osdp_LSTATR)
7.7 Input status report (osdp_ISTATR)
7.8 Output status report (osdp_OSTATR)
Table 50 ā€“ Local status report (osdp_LSTATR)
Table 51 ā€“ Input status report (osdp_ISTATR)
47 7.9 Reader tamper status report (osdp_RSTATR)
7.10 Card data report, raw bit array (osdp_RAW)
Table 52 ā€“ Output status report (osdp_OSTATR)
Table 53 ā€“ Reader tamper status report (osdp_RSTATR)
48 7.11 Card data report, character array (osdp_FMT)
7.12 Keypad data report (osdp_KEYPAD)
Table 54 ā€“ Card data report, raw bit array (osdp_RAW)
Table 55 ā€“ Card data report, character array (osdp_FMT)
49 7.13 Communication configuration report (osdp_COM)
7.14 Scan and send biometric data (osdp_BIOREADR)
Table 56 ā€“ Keypad data report (osdp_KEYPAD)
Table 57 ā€“ Communication configuration report (osdp_COM)
50 7.15 Scan and match biometric template (osdp_BIOMATCHR)
7.16 Client’s ID and client’s random number (osdp_CCRYPT)
Table 58 ā€“ Scan and send biometric data (osdp_BIOREADR)
Table 59 ā€“ Scan and match biometric template (osdp_BIOMATCHR)
51 7.17 Client cryptogram packet and the initial R-MAC (osdp_RMAC_I)
7.18 Manufacturer specific reply (osdp_MFGREP)
7.19 PD busy reply (osdp_BUSY)
7.20 PIV data reply (osdp_PIVDATAR)
Table 60 ā€“ Manufacturer specific reply (osdp_MFGREP)
Table 61 ā€“ PD busy reply (osdp_BUSY)
52 7.21 osdp_GENAUTHR
7.22 Response to challenge (osdp_CRAUTHR)
Table 62 ā€“ PIV data reply (osdp_PIVDATAR)
Table 63 ā€“ General authenticate response (osdp_GENAUTHR)
53 7.23 Manufacturer specific status reply (osdp_MFGSTATR)
7.24 Manufacturer specific error reply (osdp_MFGERRR)
7.25 File transfer status (osdp_FTSTAT)
Table 64 ā€“ Response to challenge (osdp_CRAUTHR)
Table 65 ā€“ Manufacturer specific status reply (osdp_MFGSTATR)
Table 66 ā€“ Manufacturer specific error reply (osdp_MFGERRR)
54 7.26 Extended read reply (osdp_XRD)
7.26.1 General
Table 67 ā€“ File transfer status (osdp_FTSTAT)
55 7.26.2 Mode specific reply codes for XRW_MODE=0
7.26.3 Mode-00 error reply (osdp_PR00ERROR)
7.26.4 Mode setting report (osdp_PR00REQR)
Table 68 ā€“ Extended read reply
Table 69 ā€“ Mode specific reply codes
Table 70 ā€“ Error reply
56 7.26.5 Card information report (osdp_PR00CIRR)
7.26.6 Mode specific reply codes for XRW_MODE=1
Table 71 ā€“ Mode setting report
Table 72 ā€“ Card information report
Table 73 ā€“ Mode specific reply codes
57 7.26.7 Mode-01 NAK or error reply (osdp_PR01ERROR)
7.26.8 Card present notification reply (osdp_PR01PRES)
7.26.9 Transparent card data reply (osdp_PR01SCREP)
Table 74 ā€“ Error reply
Table 75 ā€“ Card present notification reply
Table 76 ā€“ Transparent card data reply
58 7.26.10 Secure PIN entry complete reply (osdp_PR01SPER)
Table 77 ā€“ Transparent card data reply
59 Annex A (normative)Command and reply code numbers commands
A.1 Commands
Table A.1 ā€“ Commands code numbers
60 A.2 Replies
Table A.2 ā€“ Replies code numbers
61 Annex B (normative)Function code definitions list
B.1 General
B.2 Function code 1 ā€“ Contact status monitoring
Table B.1 ā€“ Function codes
62 B.3 Function code 2 ā€“ Output control
B.4 Function code 3 ā€“ Card data format
B.5 Function code 4 ā€“ Reader LED control
63 B.6 Function code 5 ā€“ Reader audible output
B.7 Function code 6 ā€“ Reader text output
B.8 Function code 7 ā€“ Time keeping
B.9 Function code 8 ā€“ Check character support
64 B.10 Function code 9 ā€“ Communication security
B.11 Function code 10 ā€“ Receive bufferSize
B.12 Function code 11 ā€“ Largest combined message size
B.13 Function code 12 ā€“ Smart card support
65 B.14 Function code 13 ā€“ Readers
B.15 Function code 14 ā€“ Biometrics
B.16 Function code 15 ā€“ Secure PIN entry support
B.17 Function code 16 ā€“ OSDP version
66 Annex C (normative)CRC definition
69 Annex D (normative)Encryption
D.1 Encryption method: OSDP-SC
D.1.1 General
Table D.1 ā€“ SEC_BLK_TYPE assignment
70 D.1.2 Overview
D.1.3 The process
D.1.4 Secure channel session connection sequence (SCS-CS)
72 D.1.5 Communication during a secure channel session
D.1.6 SCS_16 PD->ACU
D.1.7 SCS_17 ACU->PD
D.1.8 SCS_18 PD->ACU
D.2 Commands
D.2.1 Encryption key set (osdp_KEYSET)
Table D.2 ā€“ Command structure: 2-byte header followed by variable length data
73 D.2.2 Challenge and secure session initialization request (osdp_CHLNG)
D.2.3 Server’s random number and server cryptogram (osdp_SCRYPT)
D.3 Replies
D.3.1 Client’s ID and client’s random number (osdp_CCRYPT)
Table D.3 ā€“ Command structure: 8-byte random number as the ā€œchallengeā€
Table D.4 ā€“ Command structure: 16-byte server cryptogram
74 D.3.2 Client cryptogram packet and the initial R-MAC (osdp_RMAC_I)
D.4 Algorithms and support functions
D.4.1 Session key derivation
D.4.2 Key diversification
Table D.5 ā€“ Command structure: 32-byte structure
Table D.6 ā€“ Command structure: 16-byte structure
75 D.4.3 Client cryptogram
D.4.4 Server cryptogram
D.4.5 Padding
D.5 Message authentication code (MAC) generation
D.5.1 General
76 D.5.2 The wrap operation for security block types SCS_15, SCS-16, SCS_17, and SCS_18
Figure D.1 ā€“ MAC algorithm
77 D.5.3 The unwrap operation
D.6 Error recovery
D.7 Field deployment and configuration
79 Annex E (normative)Test vectors
80 Annex F (informative)Mapping of mandatory functions in IEC 60839-11-1
81 Table F.1 ā€“ Access point interface requirements
82 Table F.2 ā€“ Indication and annunciation requirements
85 Table F.3 ā€“ Recognition requirements
86 Table F.4 ā€“ Duress signalling requirements
Table F.5 ā€“ Overriding requirements
87 Table F.6 ā€“ System self-protection requirements (1 of 3)
90 Bibliography
BS EN IEC 60839-11-5:2020
$215.11