Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GB/T 25057-2010 English PDF

Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GB/T 25057-2010RFQ ASK 7 days Information security techniques -- Public key infrastructure -- Specification of application interface of electronic signature card Obsolete

Similar standards

GB/T 25068.1   GB/T 25058   GB/T 25070   GB/T 25066   GB/T 25067   GB/T 25061   

Basic data

Standard ID: GB/T 25057-2010 (GB/T25057-2010)
Description (Translated English): Information security techniques -- Public key infrastructure -- Specification of application interface of electronic signature card
Sector / Industry: National Standard (Recommended)
Classification of Chinese Standard: L80
Classification of International Standard: 35.040
Word Count Estimation: 44,481
Date of Issue: 2010-09-02
Date of Implementation: 2011-02-01
Quoted Standard: GB/T 16649.8; ISO/IEC 7816-4-2005; ISO/IEC 7816-15-2004
Regulation (derived from): Announcement of Newly Approved National Standards No. 4 of 2010 (total 159)
Issuing agency(ies): General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China
Summary: This standard specifies the basic commands electronic signature card packets and the corresponding response packet, and electronic signature card file structure, This standard applies to standardize and guide the development of electronic signature cards, norms and guidelines for communication with the electronic signature card to access the card files, applications private key to generate an electronic signature application system development, this standard does not apply to electronic signatures the card to create a file or use the public key application development,

GB/T 25057-2010: Information security techniques -- Public key infrastructure -- Specification of application interface of electronic signature card


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security techniques. Public key infrastructure. Specification of application interface of electronic signature card ICS 35.040 L80 National Standards of People's Republic of China Information security technology - Public key infrastructure Electronic signature card application interface basic requirements Issued on. 2010-09-02 2011-02-01 implementation Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China Standardization Administration of China released

Table of Contents

Preface Ⅰ Introduction Ⅱ 1 Scope 1 2 Normative references 1 3 Terms and definitions 4 Abbreviations 3 5 Command Interface 3 5.1 Command Summary 3 Select the file 4 5.2 5 5.3 Get Response 5 5.4 binary read 5.5 Binary write 6 5.6 Verify PIN 7 5.7 Security Environment. Recovery 7 5.8 Environmental Security. Set 8 5.9 perform a security operation. 9 Hash 5.10 perform a security operation. Signature 10 5.11 perform a security operation. 10 to decrypt Modify the reference data 11 5.12 5.13 generate the key pair 11 Appendix A (normative) card file system 13 A.1 Summary 13 A.2 special files and basic documents and their access conditions 13 Annex B (informative) Application of electronic signature 25 B.1 Overview 25 B.2 Card Reset (ATR) 25 B.3 read the catalog file 25 B.4 Application Selection 25 B.5 reads the object directory file 26 B.6 electronic signatures 26 B.7 decryption operation 28 B.8 Card Maintenance 30 Appendix C (Informative Appendix) FCI template coding 32 Annex D (informative) command status code 37 References 39

Foreword

This standard is in line with the implementation of the "People's Republic of China Electronic Signature Law", the wide range of opinions on the basis of GB/T 16649 series of standards and reference partial extension. Appendix A of this standard is a normative appendix, Appendix B, Appendix C, Appendix D is an informative annex. This standard by the National Safety Standardization Technical Committee (SAC/TC260) and focal points. This standard was drafted. Beijing Feitian Technologies Co., Ltd., China Electronics Standardization Institute, the National Information Security Engineering Technology Art research center. The main drafters. Zhang Hua, Zhou Kui Liang, Zhu Pengfei.

Introduction

"People's Republic of China Electronic Signature Law" stipulates that an electronic signature means the data message contained in electronic form, attached to identify signatures And indicate the identity of the signer approved the data contents therein. Generating an electronic signature function has secure client support, referred to as an electronic signature Name card. A digital signature is one of the main forms of electronic signatures. Accordingly, the IC card has a digital signature function is the main One type of electronic signature card. GB/T 16649 series of standards for IC card provisions. However, the digital signature and electronic signature Category names are not the same, but is not limited to the electronic signature card IC card. In order to avoid technical details of the implementation of the "People's Republic of China Electronic Signature Law" cause interference standards for electronic signature card application interface, Development of this standard. Minimum instruction intended to define and standardize the application of electronic signature to complete a collection. This standard references and partial expansion in GB/T 16649 series of standards basis. SHA-1, RSA and other cryptographic algorithm given in this standard are exemplary description, the State shall adopt the specific use password management unit Corresponding algorithm door ratification. Information security technology - Public key infrastructure Electronic signature card application interface basic requirements

1 Scope

This standard specifies the file structure of the basic commands electronic signature card messages and the corresponding response packet, and electronic signature cards. This standard applies to the development of specifications and guidance electronic signature card, norms and guidance and electronic signature cards to communicate within the access card file, Private key generation application development of electronic signature applications. This standard is not used to create the file or use the public key to develop applications in the electronic signature card.

2 Normative references

The following documents contain provisions which, through reference in this standard and become the standard terms. For dated references, subsequent Amendments (not including errata content) or revisions do not apply to this standard, however, encourage the parties to the agreement are based on research Whether the latest versions of these documents. For undated reference documents, the latest versions apply to this standard. GB/T 16649.8 Identification cards contact IC cards - Part 8. Security related inter-industry commands (GB/T 16649.8-2002, ISO /IEC 7816-8.1999, IDT) ISO /IEC 7816-4.2005 Identification cards Contact IC card - Part 4. Organization of inter-industry exchange, security And Command (ISO /IEC 7816-4.2005Identificationcards-Integratedcircuitcardswithcontacts-Part 4. Organization, securityandcommandsforinterchange) ISO /IEC 7816-15.2004 Part 15 of the integrated circuit card identification cassette contacts. Password application information (ISO /IEC 7816-15.2004Identificationcards-Integratedcircuitcardswithcontact-Part 15. Cryptographicin- formationapplication)

3 Terms and Definitions

The following terms and definitions apply to this standard. 3.1 Application application To meet the specific functions required data structures, data elements and program modules. [ISO /IEC 7816-4.2005] 3.2 Electronic signature card electronicsignaturecard Generating an electronic signature function has secure client support, referred to as an electronic signature card. 3.2 Packet message Application to the electronic signature card (or vice versa) string of bytes, not including transmission control characters. 3.3 Command command Application of a byte string sent to the electronic signature card, the information to start an action or request a response. 3.4 Response response After the electronic signature card processed the received command packet back to the terminal string of bytes.
......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 25057-2010_English be delivered?

Answer: Upon your order, we will start to translate GB/T 25057-2010_English as soon as possible, and keep you informed of the progress. The lead time is typically 4 ~ 7 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 25057-2010_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 25057-2010_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.