GB/T 39576-2020 English PDFUS$369.00 · In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 39576-2020: Test methods for security capability of mobile terminal with syncretic function Status: Valid
Basic dataStandard ID: GB/T 39576-2020 (GB/T39576-2020)Description (Translated English): Test methods for security capability of mobile terminal with syncretic function Sector / Industry: National Standard (Recommended) Classification of Chinese Standard: M30 Classification of International Standard: 33.050 Word Count Estimation: 20,266 Date of Issue: 2020-12-14 Date of Implementation: 2021-07-01 Quoted Standard: GB/T 39575-2020; YD/T 3082-2016 Regulation (derived from): National Standard Announcement No. 28 of 2020 Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration Summary: This standard specifies testing methods for the security capabilities of mobile terminals with integrated functions, including hardware security capabilities, operating system security capabilities, application software security capabilities, communication connection security capabilities, and personal information security protection capabilities. This standard applies to mobile terminals with fusion functions of various standards, and other terminals can also be used as a reference. GB/T 39576-2020: Test methods for security capability of mobile terminal with syncretic function---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.(Mobile terminal security capability testing method with fusion function) ICS 33:050 M30 National Standards of People's Republic of China Mobile terminal security capabilities with fusion functions testing method 2020-12-14 release 2021-07-01 implementation State Administration for Market Regulation Issued by the National Standardization Management Committee Table of contentsPreface Ⅲ Introduction Ⅳ 1 Scope 1 2 Normative references 1 3 Terms and definitions, abbreviations 1 3:1 Terms and definitions 1 3:2 Abbreviations 1 4 Mobile terminal security capability test method with fusion function 2 4:1 Overview 2 4:2 Hardware Security 2 4:2:1 Unique ID 2 4:2:2 Design safety 2 4:2:3 Preventing physical attacks 3 4:3 System and software security 3 4:3:1 Secure Boot 3 4:3:2 Integrity Check 4 4:3:3 Terminal access authentication 4 4:3:4 Identification and authentication 4 4:3:5 Access Control 6 4:3:6 Access control 6 4:3:7 Security domain isolation 7 4:3:8 Log Audit 7 4:3:9 System Security 8 4:3:10 Upgrade update 8 4:3:11 Software Security 9 4:4 Communication connection security 11 4:4:1 Network access security 11 4:4:2 Peripheral interface security 11 4:4:3 Data transmission integrity 12 4:4:4 Data transmission confidentiality 12 4:4:5 Robustness of data transmission 13 4:5 Personal Information Security 13 4:5:1 Collection of personal information 13 4:5:2 Personal information storage 14 4:5:3 Personal information processing 14 4:5:4 Transfer of personal information 15 4:5:5 Deletion of personal information 15 Reference 16ForewordThis standard was drafted in accordance with the rules given in GB/T 1:1-2009: Please note that certain contents of this document may involve patents: The issuing agency of this document is not responsible for identifying these patents: This standard was proposed by the Ministry of Industry and Information Technology of the People's Republic of China: This standard is under the jurisdiction of the National Communication Standardization Technical Committee (SAC/TC485): Drafting organizations of this standard: China Academy of Information and Communications Technology, Qualcomm Wireless Communication Technology (China) Co:, Ltd:, Zhenzhen Zebra Technology (Shanghai) Trading Co:, Ltd:, Lenovo Mobile Communication Technology Co:, Ltd: The main drafters of this standard: Yao Yinan, Chen Wanying, Dong Ji, Zhai Shijun, Wang Yuxiao, Wang Jiayi, Du Zhimin, Weng Yuan, Li Xin:IntroductionWith the rapid development of the mobile Internet, traditional smart terminal phones, tablet computers, etc:, cannot fully meet the needs of users: Therefore, many mobile terminals with integrated functions such as in-vehicle smart terminals, wearable smart terminals, and smart homes have emerged: Users are enjoying It also faces many security risks when it brings a variety of functions: In recent years, the malicious use of mobile terminals with fusion functions Frequent security incidents such as fees and privacy leaks have greatly affected the use of users and restricted their development: The reason is that the fusion function is gradually increasing Many, but the terminal design itself does not have too many security considerations, and there is no appropriate security protection, resulting in personal information leakage, tariff loss, etc: Security Question: Therefore, it is necessary to check the hardware, operating system, peripheral interface, application software and personal information of mobile terminals with fusion functions: Protection and other aspects put forward a set of safety requirements: This standard is the test method for GB/T 39575-2020: This standard aims at the technical indicators proposed by GB/T 39575-2020 Corresponding and scientific test methods are designed to verify whether the mobile terminal with fusion function meets the technical requirements: Through this standard, the management of the security capabilities of mobile terminals with fusion functions can be strengthened, and the security capabilities requirements can be guaranteed from the perspective of test methods The implementation of this policy will effectively improve its security capabilities: Mobile terminal security capabilities with fusion functions testing method1 ScopeThis standard specifies test methods for the security capabilities of mobile terminals with fusion functions, including hardware security capabilities, operating system security capabilities Power, application software security capability, communication connection security capability, personal information security protection capability: This standard applies to mobile terminals with integrated functions of various standards, and other terminals can also be used as a reference:2 Normative referencesThe following documents are indispensable for the application of this document: For dated reference documents, only the dated version applies to this article Pieces: For undated references, the latest version (including all amendments) applies to this document: GB/T 39575-2020 Technical requirements for security capabilities of mobile terminals with fusion functions YD/T 3082-2016 Technical requirements for personal information protection on mobile smart terminals 3 Terms and definitions, abbreviations 3:1 Terms and definitions The following terms and definitions apply to this document: 3:1:1 Mobile terminal with syncretic function It can collect and process information of people or things, have cellular network and Internet access functions, and support voice or data communication: Terminal equipment with fusion function: 3:1:2 Syncreticfunction Based on terminal hardware and software resources and capabilities, non-communication industry functions other than voice and data communications carried on the terminal (for example: Digital TV broadcasting, vehicle control, code scanning, human body information collection, etc:): 3:1:3 Desensitization The original data is processed through obfuscation and other methods to achieve data protection that shields sensitive data and irreversibly recovers the shielded data the way: 3:2 Abbreviations The following abbreviations apply to this document: API: Application Programming Interface (ApplicationProgrammingInterface) CNVD: National Information Security Vulnerability Sharing Platform (ChinaNationalVulnerabilityDatabase) CNNVD: China National Vulnerability Database of Information Security Vulnerability Database (ChinaNationalVulnerabilityDatabaseofInformationSecuri- ty) ......Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 39576-2020_English be delivered?Answer: Upon your order, we will start to translate GB/T 39576-2020_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.Question 2: Can I share the purchased PDF of GB/T 39576-2020_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 39576-2020_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. |