|
US$279.00 · In stock Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 36099-2018: Application software trustworthiness verification based on behavior declaration Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 36099-2018 | English | 279 |
Add to Cart
|
3 days [Need to translate]
|
Application software trustworthiness verification based on behavior declaration
| Valid |
GB/T 36099-2018
|
PDF similar to GB/T 36099-2018
Basic data | Standard ID | GB/T 36099-2018 (GB/T36099-2018) | | Description (Translated English) | Application software trustworthiness verification based on behavior declaration | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L77 | | Classification of International Standard | 35.080 | | Word Count Estimation | 14,174 | | Date of Issue | 2018-03-15 | | Date of Implementation | 2018-10-01 | | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 36099-2018: Application software trustworthiness verification based on behavior declaration---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Application software trustworthiness verification based on behavior declaration
ICS 35.080
L77
National Standards of People's Republic of China
Verification of Application Software Trustworthiness Based on Behavioral Claims
Published by.2018-03-15
2018-10-01 implementation
General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China
China National Standardization Administration released
Directory
Preface I
1 Scope 1
2 Terms and Definitions 1
3 Abbreviations 1
4 Application Software Behavior Statement Content Requirements 1
5 Verification process 2
6 Application Software Verification Example 3
Appendix A (Informative Appendix) Example of Application Software Verification 4
Foreword
This standard was drafted in accordance with the rules given in GB/T 1.1-2009.
Please note that some of the contents of this document may involve patents. The issuing agency of this document does not assume responsibility for identifying these patents.
This standard was proposed and managed by the National Information Technology Standardization Technical Committee (SAC/TC28).
This standard was drafted by. National Application Software Product Quality Supervision and Inspection Center, China Electronics Standardization Institute, Beijing Industrial University
School, Beijing Digital Haze Information Technology Co., Ltd.
The main drafters of this standard. Song Hongbo, Liang Yong, Yu Xuejun, Wang Hao, Li Jian, Wang Kun, and Deng Hao.
Verification of Application Software Trustworthiness Based on Behavioral Claims
1 Scope
This standard stipulates the content requirements of the application software behavior statement and gives the verification process of application software credibility based on the behavior statement.
This standard is applicable to the verification of the credibility of application software on personal computers and mobile information processing devices.
2 Terms and Definitions
The following terms and definitions apply to this document.
2.1
Application software credibility applicationsoftware trustworthiness
The actual behavior of the application software is consistent with the declared behavior.
2.2
Behavior statement behaviordeclaration
Application software developer's express commitment document for the sensitive behavior of application software.
2.3
Sensitive behavior sensitivebehavior
One or more of the following. behavior that may infringe upon the user’s rights to the application software, behavior that may infringe upon other software rights, may be
Affecting the behavior of other software operations may cause the user to change the configuration of the hardware and software environment that cannot be expected.
NOTE. Includes, but is not limited to, device-related, configuration-related, data-related, and environment-related behaviors.
3 Abbreviations
The following abbreviations apply to this document.
API. Application Programming Interface (Application Programming Interface)
TCP. Transmission Control Protocol
UDP. User Datagram Protocol
XML. Extensible Markup Language
4 Application Software Behavior Statement Content Requirements
The requirements of the application software behavior statement are as follows.
a) The behavior statement file itself should have an integrity verification mechanism. The behavior statement file includes its own integrity based on the digital signature
Verification methods to prevent falsification of behavioral statements and to ensure the validity of the behavioral statements.
b) The statement of behavior shall have information verifying the version and integrity of the application software. Statement of behavior includes version of application software
This verification mechanism and software integrity verification mechanism to prevent tampering with application software files while preventing the use of behavioral claims
Unexpected software version.
c) The statement of conduct should include a list of sensitive applications of software applications. The list describes the sensitive actions that may occur during the operation of the application software.
The sensitive behavior described here refers to behavior that may infringe on the rights of its users, may infringe other software rights, and may affect
|