Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GB/T 29827-2013 English PDF

US$979.00 · In stock
Delivery: <= 7 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 29827-2013: Information security technology -- Trusted computing specification -- Motherboard function and interface of trusted platform
Status: Valid
Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GB/T 29827-2013979 Add to Cart 7 days Information security technology -- Trusted computing specification -- Motherboard function and interface of trusted platform Valid

Similar standards

SJ/T 11281   GB/T 18910.2   GB/T 45722   GB/T 45719   GB/T 45716   

Basic data

Standard ID: GB/T 29827-2013 (GB/T29827-2013)
Description (Translated English): Information security technology -- Trusted computing specification -- Motherboard function and interface of trusted platform
Sector / Industry: National Standard (Recommended)
Classification of Chinese Standard: L40
Classification of International Standard: 35.080
Word Count Estimation: 44,425
Quoted Standard: GB/T 29829-2013; UEFI V2.1
Regulation (derived from): National Standards Bulletin No. 22 of 2013
Issuing agency(ies): General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China
Summary: This standard specifies the composition of the board of trusted platform structure, chain of trust building processes, functional interface. This standard applies based on the design, production and use of the Trusted Platform Module Trusted Platform cont

GB/T 29827-2013: Information security technology -- Trusted computing specification -- Motherboard function and interface of trusted platform


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology. Trusted computing specification. Motherboard function and interface of trusted platform ICS 35.080 L40 National Standards of People's Republic of China Information security technology trusted computing specifications Trusted Platform Interface Board Features Issued on. 2013-11-12 2014-02-01 implementation Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China Standardization Administration of China released

Table of Contents

Preface Ⅰ 1 Scope 1 2 Normative references 1 3 Terms and definitions 4 Abbreviations 3 4 5 composition structure Trust chain transfer 5 6 7 6 Integrity Measurement 8 9 initial measure 9 traditional BIOS Integrity Measurement 11 10 UEFIBIOS integrity metric 14 11 Trusted Platform Interface Board Features 17

Foreword

This standard was drafted in accordance with GB/T 1.1-2009 given rules. This standard by the National Safety Standardization Technical Committee (SAC/TC260) and focal points. Drafting of this standard. Beijing University of Technology, China Great Wall Computer Shenzhen Co., Ltd., Nanjing Byosoft limited stock The company, CASIC hospital seven hundred and six, Wuhan University, China Research Center of overall CETC Information Engineering, Beijing Long Core Branch Technical Service Center Co., Ltd., Jiangnan Institute of Computing Technology, Rui Da Information Security Industry Co., Ltd., in the Security Technology Group Ltd., China Shipbuilding Industry Corporation 707, the Beijing Chinese Academy of Sciences Software Research Center, Beijing Huatai Heng Tai Technology Co., Ltd., Beijing Chao-yi Century Network Technology Co., Ltd., Huawei Technologies Co., Gui Lin Changhai Technology Co., Ltd., China Electronics Standardization Institute The study. Drafters of this standard. Shen Chang-xiang, Hanyong Fei, Zhang, crown, Lin Shi Da, Xu Mindy, Wangzheng Peng, Jiang Zhixiang, Zhao Lina Zhou Yi-hua, Shi Ming, Zhang Bin, Ray hole, Huanguo Zhang, Wang Wenjie, Huming Chang, Wu Xinjun, Chen Lin, Li Dadong, Wang Ran, Charles Zhang, Fang Ai, Tong Guangsheng, Xu Shu Huan, Li Chen, Jia Bing, Du Zhongping, Du Hui, Xie dry, Zhao Bo, Zhang Chao, Wu Yong, Shiliang Jun, Ma Yinsheng, Guo Jingchuan, WORKER, Song Yang, Gao Zhan, Chinese New Year song, Yu Fajiang, Jordan Chan, Cai Ye, Yuanai Dong, Zhuang jade, Ying Ming Zeng, Sun Yongquan, Duan Lijuan, Song Jing, Zhu He Xin, Guo Linger, Liu Zhijun, Teng Zhigang, Jin gushing, Guo Yi, Xiao Yi, SUN Sheng Chao, Liu Jun, Chen Ying, Zou Na. Information security technology trusted computing specifications Trusted Platform Interface Board Features

1 Scope

This standard specifies the composition of the board trusted platform structure, chain of trust build process, functional interface. This standard applies to based on the design, production and use of the Trusted Platform Module Trusted Platform control board.

2 Normative references

The following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein Member. For undated references, the latest edition (including any amendments) applies to this document. GB/T 29829-2013 Information security technology trusted computing platform password support functions and interface specifications UEFIV2.1 Unified Extensible Firmware Interface Specification (UnifiedExtensibleFirmwareInterfaceSpecification)

3 Terms and Definitions

The following terms and definitions apply to this document. 3.1 Trusted Root rootoftrust Corresponds TPCM module. 3.2 Amount of credibility root rootoftrustformeasurement Can be a reliable measure of the integrity calculation engine, it is the starting point of trust transport chain. 3.3 Trusted storage root rootoftrustforstorage It can be a reliable and secure storage calculation engine. 3.4 Credible reports root rootoftrustforreporting A report can be reliably trusted root store calculation engine of the information stored. 3.5 General Equipment generaldevice In the original PC motherboard compatible hardware devices, including a central processing unit (CPU), external memory, random access memory, video control And so on. 3.6 The initial read-only memory bootROM It provides the lowest level of the firmware in computer hardware settings during startup. Note. The initial read-only memory in the composition and structure is divided into BootBlock MainBlock two parts, divided according to the type of traditional BIOS and UEFIBIOS.
......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 29827-2013_English be delivered?

Answer: Upon your order, we will start to translate GB/T 29827-2013_English as soon as possible, and keep you informed of the progress. The lead time is typically 4 ~ 7 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 29827-2013_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 29827-2013_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.