Digital Product Passport – Data Exchange Protocols (DIN EN 18216:2025 Draft)
Background & Context
- Draft European Standard: prEN 18216:2025 (DIN EN 18216:2025-07)
- Developed by CEN/CENELEC JTC 24 “Digital Product Passport – Framework & System”; German secretariat: DIN.
- Triggered by Commission Implementing Decision C(2024) 5423 final (31 Jul 2024) – standardisation request for the Digital Product Passport (DPP).
- Supports Ecodesign Regulation (EU) 2024/1781 (28 Jun 2024); relationship mapped in Annex ZA.
- Public enquiry period ends 13 Aug 2025 (comments via DIN portals, e-mail, or paper).
- Total draft length: 37 pages; bilingual (DE/EN, with FR title).
Scope & Objectives (Clause 1)
- Defines secure & efficient:
- Data exchange protocols (rules/procedures for communication).
- Data formats (structure/presentation of information).
- Guarantees data that is:
- Machine-readable, structured, searchable.
- Transferable over open, interoperable networks (no vendor lock-in).
- Five strategic goals:
- Secure communication – authenticated, access-controlled.
- Interoperability – easy integration across sectors/legacy systems.
- Ease of use & integration – incl. mobile devices, user-friendly.
- Data integrity – trust from production to end-of-life.
- Documentation & discoverability – accessible to non-experts.
- Aligns with existing EU legislation & standards to lower business costs.
Key Terms & Definitions (Clause 3)
- Identifier: sequence of characters linked to entities (books, images, events).
- Data exchange: storing, accessing, transferring, archiving data.
- Identification: recognising an object as distinct within a domain.
- Authentication: verification that a claimed identity is correct.
- Data integrity: property that data is unaltered/undestroyed \Rightarrow protects against tampering during transmission.
- Secure communication: transmission mechanism ensuring confidentiality, integrity & authenticity.
Data Exchange Protocols (Clause 4)
- Mandatory:
- RESTful APIs over HTTP (architectural style leveraging HTTP verbs, resources, statelessness).
- HTTPS (HTTP over TLS): secure version of HTTP.
• TLS 1.3 (RFC 8446) & successors.
• HTTP versions: HTTP/1.1 (RFC 7230-7235), HTTP/2 (RFC 7540), HTTP/3 (RFC 9114).
- Other protocols permitted by bilateral agreement (flexibility clause).
- Primary: JSON – lightweight, human & machine readable.
- Also allowed (message formats):
- XML – structured markup, hierarchical.
- JSON-LD – JSON serialisation for Linked Data (adds semantic context).
- Human-readable rendering: via HTML (must comply with W3C HTML standards; CSS & JavaScript optional). DPP need not be stored as HTML, only rendered.
Data Exchange Protocol Requirements (Clause 6)
- 6.1 General: protocols enable seamless, technology-agnostic sharing of specifications, origin, materials, compliance certificates, sustainability metrics, etc.
- 6.2 Secure data exchange: ALL server-client traffic MUST use TLS.
- Applies especially to B2C scenarios (mobile apps, desktop, embedded systems).
- Refers to ISO/IEC 27033 (network security) & ISO/IEC 27001 (ISMS).
- 6.3 Confidentiality & Integrity:
- DPP data encrypted in transit.
- Covers B2B & B2G hand-overs inside supply chains.
- 6.4 Secure transmission: only secure protocols may carry DPP.
- 6.5 Non-repudiation: sender/receiver cannot deny DPP transfer.
- 6.6 Data transfer protocols: shall at minimum satisfy Clause 5(b), 7.2 & 7.5 (cross-references ensure full security + usability).
Data Exchange – Usability & Integration (Clause 7)
- 7.1 Security & access control: encryption + integrity mandatory.
- 7.2 Ease of use:
- Table 1 compares HTTPS & REST APIs for Consumers, SMEs, Large Enterprises.
• Consumers: browsers auto-handle HTTPS.
• SMEs: free certificates (Let’s Encrypt); developer-friendly frameworks.
• Large enterprises: dedicated IT teams; existing API infrastructure.
- 7.3 Data integrity mechanisms:
- HTTP over TLS:
• Message Authentication Codes (MACs).
• TLS handshake negotiates cipher suites (e.g. SHA-256).
• Sequence numbers prevent replay attacks.
• Certificate validation by trusted CAs. - RESTful APIs (usually over HTTPS):
• Input/response validation.
• Digital signatures inside JWT (HMAC or RSA).
• OAuth 2.0 / OIDC token validation.
• Use of safe & idempotent HTTP verbs (GET, PUT).
Secure Communication (Clause 8)
- 8.1 General: must ensure confidentiality, integrity, authenticity.
- 8.2 HTTPS (TLS 1.2/1.3):
- Asymmetric PKI: public key (encrypt) vs private key (decrypt).
- Prevents man-in-the-middle & eavesdropping.
- 8.2 RESTful APIs:
- Rely on HTTPS.
- Characteristics: statelessness, confidentiality, integrity, availability.
- Must implement: rate-limiting, DDoS protection, error handling with proper HTTP status codes (e.g. 401, 403).
Identification, Authentication & Authorization (Clause 8.3)
- Use-case example: EV battery DPP – ownership chain (public) vs cell manufacturing manuals (restricted).
- 8.3.1 OAuth 2.0:
- Token-based access; scopes enforce least-privilege.
- Access tokens expire; refresh tokens renew access securely.
- 8.3.2 OpenID Connect (OIDC):
- Adds ID Token (signed JWT) for user authentication.
- Supports Single Sign-On (SSO); all token exchanges over HTTPS.
- 8.3.3 CEF eID (Connecting Europe Facility):
- Pan-EU cross-border e-ID; leverages XML-Signatures for integrity/authenticity.
- 8.3.4 Decentralised Identifiers (DIDs):
- Self-sovereign identities on blockchain or similar decentralised ledgers.
- Support verifiable credentials; public-key cryptography; secure HTTPS transport.
Non-Repudiation & Audit Trail
- Ensured through:
- Cryptographic proofs (MACs, digital signatures).
- TLS sequence numbers & certificates.
- Logging & rate-limit events (mentioned in REST security).
Compatible Systems (Annex A)
- AS4 Profile of OASIS ebMS 3.0 – secure document exchange via Web Services.
- Asset Administration Shell (AAS) – digital twin; interoperable over industrial protocols.
- EDI – computer-to-computer business document exchange using standardised protocols.
- Note: list is non-exhaustive; other solutions possible.
Regulatory Alignment (Annex ZA)
- Table ZA.1 maps prEN 18216 clauses to Ecodesign Regulation (EU) 2024/1781 requirements.
- Examples:
• 10.1(d) \rightarrow Clauses 5 & 6 for open, interoperable standards.
• 11(a) \rightarrow Clauses 6 & 8 for data formats & integrity.
• 11(h) \rightarrow Clauses 9.1 & 9.2 (secure HTTP + REST implementation).
• 14, 15.1, 15.2, 15.4 \rightarrow Clauses on secure exchange, non-repudiation, confidentiality, integrability.
- Presumption of conformity valid only while standard is listed in OJEU.
Bibliography & Reference Standards
- ISO 24619 (PISA) – persistent identifiers.
- ISO 15531-43 – manufacturing data exchange.
- ISO/IEC 24760-1 – identity management.
- ISO/IEC/IEEE 8802-1AR (2020) – secure device identity.
- ISO 7498-2 – OSI security architecture.
- ISO/IEC 27033 series – network security.
- ISO/IEC 27001 – ISMS requirements.
- RFC 6749 – OAuth 2.0
- Auth0 docs – OpenID Connect protocol.
- EU Digital Building Blocks – eID.
- W3C DID Core 1.0 – Decentralised Identifiers.
Practical Implications & Take-aways
- Implementers must:
- Use TLS 1.2/1.3 for all DPP transactions.
- Expose/consume DPP via REST APIs with JSON/JSON-LD payloads; XML optional.
- Provide HTML rendering for human consumption.
- Integrate OAuth 2.0 / OIDC or equivalent for access control; consider CEF eID or DIDs for cross-border/self-sovereign contexts.
- Record cryptographic proofs for non-repudiation.
- Organisations should align internal ISMS with ISO/IEC 27001 and network security with ISO/IEC 27033 to meet standard expectations.
- Supply chains must plan for B2B/B2G encrypted transfers & fine-grained permissions (e.g. recyclers vs public viewers).
- Regulators/Notified Bodies can use Annex ZA mapping for conformity assessments.