GB/T 35291-2017 English PDFUS$1079.00 · In stock
Delivery: <= 9 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 35291-2017: Information security technology -- Cryptography token application interface specification Status: Valid
Basic dataStandard ID: GB/T 35291-2017 (GB/T35291-2017)Description (Translated English): Information security technology -- Cryptography token application interface specification Sector / Industry: National Standard (Recommended) Classification of Chinese Standard: L80 Classification of International Standard: 35.040 Word Count Estimation: 54,541 Date of Issue: 2017-12-29 Date of Implementation: 2018-07-01 Issuing agency(ies): General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China GB/T 35291-2017: Information security technology -- Cryptography token application interface specification---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order. Information security technology-Cryptography token application interface specification ICS 35.040 L80 National Standards of People's Republic of China Information Security Technology Smart Key Key Application Interface Specification 2017-12-29 Posted 2018-07-01 implementation General Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China China National Standardization Administration released Directory Foreword Ⅲ Introduction IV 1 Scope 1 2 Normative references 1 3 Terms and definitions 1 4 Abbreviations 1 5 structural model 2 5.1 Hierarchy 2 5.2 equipment application structure 2 6 Data Type Definition 3 6.1 Algorithm Identification 3 6.2 Basic Data Types 3 6.3 constant definition 4 6.4 Compound Data Types 4 7 interface function 12 7.1 Equipment Management 12 7.2 Access Control 15 7.3 Application Management 17 7.4 File Management 19 7.5 Container Management 21 7.6 Password Service 23 8 equipment safety requirements 45 8.1 Equipment use stage 45 8.2 Rights Management 45 8.3 Key Security Requirements 46 8.4 equipment anti-attack requirements 46 Appendix A (Normative) Error Code Definition and Description 47 ForewordThis standard is based on GB/T 1.1-2009 given rules drafted. Please note that some of this document may be patentable. The issuing agencies of this document do not bear the responsibility of identifying these patents. This standard is proposed by the National Information Security Standardization Committee (SAC/TC260) and centralized. This standard was drafted by. Beijing Haitai radius of Science and Technology Co., Ltd., Beijing Branch odd intelligence Technology Co., Ltd., Beijing Daming Wuzhou Branch Technology Co., Ltd., Hublot Co., Ltd., Shenzhen Ming Wah A & M Technology Co., Ltd., Wuhan Tianyu Information Industry Co., Ltd., Beijing Flying integrity Technology Co., Ltd., Huaxiang Teng Digital Technology Co., Ltd.. The drafters of this standard. Liu Ping, Guo Baoan, Shi Yuping, Liu Zengshou, Hu Junyi, Guan Yanjun, Zhao Zhaoxing, Liu Weifeng, He Yongfu, Li Gaofeng, Wang Xuelin, Zhao Liming, Jiang Hongyu, Wang Ye.IntroductionThe purpose of this standard is to develop a uniform application interface standard for the intelligent cryptographic key device under the framework of public key cryptography infrastructure application system Quasi, through the interface to call the smart password key, to provide the underlying basis of cryptographic services. For the development of this type of password equipment, use and testing mention For the standard basis and guidance, help to improve the production of such equipment, standardization and serialization level. This standard does not include the identification algorithm SM9 related application interface. Information Security Technology Smart Key Key Application Interface Specification1 ScopeThis standard specifies the PKI password-based smart key application interface, describes the function of the password-related application interface, the number of According to type, the definition of parameters and equipment safety requirements. This standard applies to the development of smart key products, use and testing.2 Normative referencesThe following documents for the application of this standard is essential. For dated references, only the dated version applies to this article Pieces. For undated references, the latest edition (including all amendments) applies to this document. GB/T 33560 Information security technology password application identification specifications GM/T 0022 IPSec VPN Technical Specifications GM/T 0024 SSLVPN Technical Specifications3 Terms and definitionsThe following terms and definitions apply to this document. 3.1 Container container The unique storage space used to store the key in the password device. 3.2 Device authentication deviceauthentication Intelligent Password Key Authentication of applications. 3.3 Device authentication key deviceauthenticationkey The key used for device authentication. 3.4 Device label label A character string that is set by the user and stored inside the device to identify the device.4 AbbreviationsThe following abbreviations apply to this document. API Application Programming Interface (ApplicationProgrammingInterface) MAC Message Authentication Code (MessageAuthenticationCode) PIN Personal Identification Number (PersonalIdentificationNumber) ...... |