Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GB/T 35287-2017 English PDF

US$519.00 · In stock
Delivery: <= 5 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 35287-2017: Information security technology -- Guidelines of trusted identity technology for website
Status: Valid
Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GB/T 35287-2017519 Add to Cart 5 days Information security technology -- Guidelines of trusted identity technology for website Valid

Similar standards

GB/T 34953.4   GB/T 35273   GB/T 34953.2   GB/T 35290   GB/T 35282   

Basic data

Standard ID: GB/T 35287-2017 (GB/T35287-2017)
Description (Translated English): Information security technology -- Guidelines of trusted identity technology for website
Sector / Industry: National Standard (Recommended)
Classification of Chinese Standard: L80
Classification of International Standard: 35.040
Word Count Estimation: 26,258
Date of Issue: 2017-12-29
Date of Implementation: 2018-07-01
Regulation (derived from): National Standards Bulletin 2017 No. 32
Issuing agency(ies): General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China

GB/T 35287-2017: Information security technology -- Guidelines of trusted identity technology for website


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology - Guidelines of trusted identity technology for website ICS 35.040 L80 National Standards of People's Republic of China Information Security Technology Web Site Trusted Identification Technology Guide 2017-12-29 Posted 2018-07-01 implementation General Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China China National Standardization Administration released Directory Foreword Ⅲ Introduction IV 1 Scope 1 2 Normative references 1 3 Terms and definitions 1 4 Abbreviations 1 5 Website Trusted Identification System Framework 2 6 Website Trusted Identification Objects 2 6.1 Overview 2 6.2 Trusted Identification Object Logic 3 7 Trusted Identification Object Management 4 7.1 Trusted Identification Object Management Status Figure 4 7.2 Trusted Identification Application 5 7.3 Trusted Identification Generation 5 7.4 Trusted Identification Issued 5 7.5 Trusted ID deployment 5 7.6 Trusted Logo Change 5 7.7 Trusted Identification Expired 5 7.8 Trusted Identification Revocation 6 7.9 Trusted Label Release 6 7.10 Trusted Identification Extension 6 8 Trusted logo object acquisition and verification 6 9 data format and interface 6 9.1 Trusted Identification Object Data Format 6 9.2 Identify revocation list data format 12 9.3 Information Release 16 9.4 Identification Status Real-time Query 17 Appendix A (informative) examples of credible identification 18 References 20

Foreword

This standard was drafted in accordance with the rules given in GB/T 1.1-2009. This standard by the National Information Security Standardization Technical Committee (SAC/TC260) and focal point. The main drafting units of this standard. Shanghai Gel Software Co., Ltd., Shanghai Ping Network Technology Co., Ltd., Beijing Qihoo Technology Limited, Tencent Technology (Beijing) Co., Ltd., Xi'an Xietong Jietong Wireless Network Communications Co., Ltd. (wireless network security technology country Engineering Laboratory), Beijing Tianwei Integrity E-Commerce Services Co., Ltd., Shanghai Digital Certificate Certification Center Co., Ltd., China Gold Financial Certification Center Co., Ltd., Beijing Digital Certification Co., Ltd., North Dragon Network (Beijing) Technology Co., Ltd., Shanghai Jiaotong University, Sichuan University Learn, Beijing Jinshan Security Software Co., Ltd. The main drafters of this standard. Yang Maojiang, Han Honghui, Ren Wei, Shi Xiaohong, Ye Feng, Xu Ji, Huang Zhenhai, Du Zhiqiang, Hu Yanan, Hao Xuan, Cui Jiuqiang, Zhao Yu, Fu Dapeng, Gao Ning, Fan Lei, Chen Xing Shu, Wang Haizhou, Zhang Zhi and Tao Si male.

Introduction

With the rapid development of the Internet, information technology has penetrated into all fields of society and played an increasingly important role. At the same time, security Topics on the Internet industry is also growing threats, of which the fake and phishing sites are particularly devastating, how to ensure the authenticity of the site identity, Effectively resist counterfeiting, phishing sites have become an important issue to be solved in the construction of national information system security. This standard defines a trusted identification system based on China's own password algorithm that can carry the real information of the website, Identification of objects, the management of trusted object identification, trusted object identification and certification, data formats and interfaces and other content specifications, designed to promote Establishment of Internet Trust System Based on National Autonomous Cipher Algorithm. Trusted websites are based on self-cipher technology and are open and available Expanded way to establish a new site certification system and management system. Information Security Technology Web Site Trusted Identification Technology Guide

1 Scope

This standard specifies the trusted identification system framework used to identify the real information of the website, and the trusted identification of objects, Management, trusted identification of objects to obtain and verify, data formats and interfaces and other content specifications. This standard applies to the trusted identification management system, trusted identification verification tools and other systems development, implementation and evaluation.

2 Normative references

The following documents for the application of this document is essential. For dated references, only the dated version applies to this article Pieces. For undated references, the latest edition (including all amendments) applies to this document. GB/T 16262 (all parts) Information Technology Abstract Syntax Notation One (ASN.1) GB/T 16264.8-2005 Information technology - Open Systems Interconnection Directory Part 8. Public key and attribute certificate framework Computer Information Systems - Security Protection Classification Guidelines GB/T 18336 (all parts) Information Technology Security Technology Information Technology Security Assessment Guidelines Information technology - Security technology - Public key infrastructure - Online certificate status protocol Information technology - Security terminology GM/T 0003 (all parts) SM2 elliptic curve public key cryptography GM/T 0004-2012 SM3 cryptographic hash algorithm RFC1777 LDAP Lightweight Directory Access Protocol (Lightweightdirectoryaccessprotocol)

3 Terms and definitions

GB 17859-1999, GB/T 18336 and GB/T 25069-2010 defined by the following terms and definitions apply to this document. 3.1 Website Trusted Identity websitetrustedidentity Unique, anti-counterfeiting and identification, a section of data used to describe the true site information, referred to as credible identification. 3.2 Identity authority identityauthority Responsible for the management of the site credible logo throughout the life cycle (registration application, issuance, release, revocation, etc.). 3.3 Trusted application trustedapplication Support Trusted Platform Logo Verification and Display Applications, including Browsers, Search Engines, Instant Messaging Software and more.

4 Abbreviations

The following abbreviations apply to this document. IA. Identity Authority (IdentityAuthority) IRL. Identity Revocation List HTTP. Hypertext Transfer Protocol (Hypertext Transfer Protocol)
......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 35287-2017_English be delivered?

Answer: Upon your order, we will start to translate GB/T 35287-2017_English as soon as possible, and keep you informed of the progress. The lead time is typically 3 ~ 5 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 35287-2017_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 35287-2017_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.