Home   Cart   Quotation   Policy   About-Us
www.ChineseStandard.net
SEARCH

GB/T 32927-2016 English PDF

US$219.00 ยท In stock
Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 32927-2016: Information security technology -- Security architecture of mobile smart terminal
Status: Valid
Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GB/T 32927-2016219 Add to Cart 3 days Information security technology -- Security architecture of mobile smart terminal Valid

Similar standards

GB/T 32918.5   GB/T 32918.4   GB/T 32921   GB/T 32922   GB/T 32920   

Basic data

Standard ID: GB/T 32927-2016 (GB/T32927-2016)
Description (Translated English): Information security technology -- Security architecture of mobile smart terminal
Sector / Industry: National Standard (Recommended)
Classification of Chinese Standard: L80
Classification of International Standard: 35.040
Word Count Estimation: 11,159
Date of Issue: 2016-08-29
Date of Implementation: 2017-03-01
Regulation (derived from): National Standard Announcement 2016 No.14
Issuing agency(ies): General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China

GB/T 32927-2016: Information security technology -- Security architecture of mobile smart terminal


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology - security architecture of mobile smart terminal ICS 35.040 L80 National Standards of People's Republic of China Information Security Technology Mobile Intelligent Terminal Security Architecture 2016-08-29 released 2017-03-01 implementation General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China China National Standardization Management Committee released Directory Preface I Introduction II 1 Scope 1 2 normative reference document 1 3 terms and definitions, abbreviations 1 3.1 Terms and definitions 1 3.2 Abbreviations 2 4 Mobile intelligent terminal security architecture 2 4.1 Overview of security architecture 2 4.2 Safety objectives 3 5 security requirements for mobile smart terminals 3 5.1 hardware security 3 5.2 system software security 3 5.3 Application software security 4 5.4 User data security 5 5.5 interface security 5 Reference 7

Foreword

This standard is drafted in accordance with the rules given in GB/T 1.1-2009. This standard is proposed by the National Information Security Standardization Technical Committee (SAC/TC260). The drafting of this standard. Ministry of Industry and Information Technology Telecommunications Research Institute, Beijing University of Posts and Telecommunications, China Mobile Communications Corporation, China United Network Communication Group Co., Ltd., Beijing Spreadtrum Transtech Services Communication Technology Co., Ltd., Baidu Online Network Technology (Beijing) Co., Ltd. The main drafters of this standard. Pan Juan, Ning Hua, Liang Hongliang, Hong Hongwei, Yang Guanghua, He Shen, Dong Hui, Shi Yan Shan, Man Zhiyong.

Introduction

With the wide range of mobile intelligent terminal applications and the continuous expansion of the use of the process of security issues are more and more users Of concern. In recent years, malicious fees, eavesdropping, user information leakage and other security incidents frequently, so that users of mobile intelligent terminal security Concerns, and thus affect the development of mobile smart terminals and mobile Internet applications. The development of this standard, aimed at mobile intelligent terminal through the security Full structure, to guide the construction of mobile intelligent terminal security standard system, standard mobile intelligent terminal involved in the design, development, testing, assessment work, Improve the security level of mobile intelligent terminals, reduce the risks faced by mobile intelligent terminals, protect users' personal security and national security, promote The healthy development of the Internet as a whole. The cryptographic applications referred to in this standard shall be implemented in accordance with the provisions of the State Administration of Taxation. This standard gives the mobile intelligent terminal security architecture, and put forward the security requirements, in order to facilitate innovation and development of mobile intelligent terminal security Structure of the specific part of the technical realization of the way, methods do not do. Information Security Technology Mobile Intelligent Terminal Security Architecture

1 Scope

This standard puts forward the security architecture of mobile intelligent terminal, and describes the security requirements of mobile intelligent terminal. This standard applies to the design, development, testing and evaluation of mobile intelligent terminals.

2 normative reference documents

The following documents are indispensable for the application of this document. For dated references, only the dated edition applies to this article Pieces. For undated references, the latest edition (including all modifications) applies to this document. Information security technical terminology GB/T 25069-2010 3 terms and definitions, abbreviations 3.1 Terms and definitions GB/T 25069-2010 Definitions and the following terms and definitions apply to this document. 3.1.1 Security mechanism securitymechanism To achieve security functions, to provide a set of security services, a combination of basic methods. 3.1.2 Security architecture securityarchitecture A collaborative architecture consisting of multiple secure modules. 3.1.3 Security audit securityaudit The monitoring and monitoring of various events and behaviors of information systems, and the corresponding actions for specific events and actions. 3.1.4 Code signatures codesignature A mechanism that uses a digital signature mechanism to sign all or part of the code by an entity with signed permission. 3.1.5 Access control A means of ensuring that the resources of the data processing system can only be accessed by the authorized entity by authorized means. 3.1.6 Vulnerability Computer information system in the demand, design, implementation, configuration, operation and other processes, intentional or unintentional defects. These defects do not The same form exists in the computer information system at all levels and links, once the use of malicious subjects, it will computer information system Of the security caused by damage, thus affecting the normal operation of computer information systems. 3.1.7 Authorize authorization After the user identity is authenticated, according to the pre-set security policy, the process of granting the user the corresponding authority.
......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 32927-2016_English be delivered?

Answer: Upon your order, we will start to translate GB/T 32927-2016_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 32927-2016_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 32927-2016_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.