Pattern I1: 1609.2.2 Multi Jurisdictional Interoperability¶
Ensures that ITS devices only trust messages and services from explicitly authorized sources. This pattern defines how devices determine which certificates to trust, which SCMS Managers or Root CAs are allowed, and what entitlements (e.g., PSIDs or SSPs) are considered valid. Trust decisions are guided by signed, policy-based structures such as Certificate Trust Lists (CTLs), with device behaviour scoped to specific operational contexts. By implementing structured interoperability policies, this pattern supports secure collaboration across jurisdictions, vendors, and SCMS domains, while preventing unauthorized use of ITS applications or services.
Devices must store and validate the latest CTL signed by the device's Home SCMS Manager.
CTLs should include detailed permission sets that scope trust to specific PSIDs, SSPs, or operational attributes.
Devices must verify that incoming message certificates match both the issuing authority and the authorized permissions within the CTL.
Trust relationships may be restricted to only a subset of applications or message types to prevent over-broad interoperability.
Implementations should allow for segmented trust, for example, accepting a Root CA for basic safety messages but not for high-privilege services like SPaT/MAP control.
An RSU in Jurisdiction A trusts SRM messages from an OBU in Jurisdiction B, but only if the certificate’s SSP matches a permitted entitlement in the CTL.