GM/T 0058-2018 PDF English
US$610.00 · In stock · Download in 9 secondsGM/T 0058-2018: Trusted computing - TCM service module interface specification Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
| GM/T 0058-2018 | English | 610 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
Trusted computing - TCM service module interface specification
| Valid |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GM/T 0058-2018
GM/T 0058-2018: Trusted computing - TCM service module interface specification---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0058-2018
CRYPTOGRAPHIC INDUSTRY STANDARD
ICS 35.040
L 80
Registration number. 62993-2018
GB/T 0058-2018
Trusted computing -
TCM service module interface specification
Issued on. MAY 02, 2018
Implemented on. MAY 02, 2018
Issued by. State Cryptography Administration
Table of Contents
Foreword... 3
Introduction... 4
1 Scope... 5
2 Normative references... 5
3 Terms and definitions... 5
4 Abbreviations... 9
5 Software architecture... 10
6 TCM application service... 11
6.1 Definition of class... 11
6.2 Relationship between class and object... 13
6.3 Interface... 15
7 TCM core services... 146
7.1 Management of TCM core service... 146
7.2 Trusted cryptographic module management... 159
7.3 Platform identity and authentication... 191
7.4 Protection of platform data... 200
7.5 Integrity measurements and reports... 227
8 TDDL device driver library... 230
8.1 TDDL architecture... 230
8.2 TDDL memory management... 231
8.3 TDDL error codes and definitions... 231
8.4 TDDL interface... 231
Appendix A (Normative) Interface data structure... 239
A.1 Basic definition... 239
A.2 Data structure... 259
A.3 Processing of authorization data... 265
Foreword
This standard was drafted in accordance with the rules given in GB/T 1.1-2009.
Please note that some of the contents of this document may involve patents.
The issuing organization of this document is not responsible for identifying
these patents.
This standard was proposed by and shall be under the jurisdiction of the
Cryptographic Industry Standardization Technical Committee.
Drafting organizations of this standard. National Technology Co., Ltd., Legend
Holdings Co., Ltd., Tongfang Co., Ltd., Institute of Software of Chinese
Academy of Sciences, Beijing Zhaori Technology Co., Ltd., Ruida Information
Security Industry Co., Ltd., Changchun Jida Zhengyuan Information Technology
Co., Ltd., Founder Technology Group Co., Ltd., Beijing Information Science and
Technology University, China Great Wall Computer Shenzhen Co., Ltd.,
Chengdu Weishitong Information Industry Co., Ltd., Wuxi Jiangnan Information
Security Engineering Technology Center, National Defense Science and
Technology University of China, Beijing University of Technology.
The main drafters of this standard. Wu Qiuxin, Yang Xianwei, Fan Qin, Zou Hao,
Yu Fajiang, Ning Xiaokui, Wang Zi, Zheng Bike, Liu Xin, Lin Yang, Li Weiping,
Yin Hongbing, Xu Zhen, Yan Fei, Fu Yuepeng, Ming Ming, Liu Ren, Li Feng, Xu
Yong, Jia Bing, Wang Lei, Gu Jian, He Changlong, Qin Yu.
1 Scope
This standard specifies the composition and interface standards of the TCM
service module, including TSP, TCS, TDDL, which are TCM application layer-
faced interface standards.
This standard applies to the development of TCM-based application.
2 Normative references
The following documents are essential to the application of this document. For
the dated documents, only the versions with the dates indicated are applicable
to this document; for the undated documents, only the latest version (including
all the amendments) are applicable to this standard.
GB/T 32905-2016 Information security technology SM3 cryptographic hash
algorithm
3 Terms and definitions
The following terms and definitions apply to this document.
The master key used to protect the platform identity key and user key, which
is an implementation of the trusted storage root.
A support system built into a computing system for implementing trusted
computing functions.
4 Abbreviations
The following abbreviations apply to this document.
5 Software architecture
The software architecture of the TCM service module is as shown in Figure 1.
This standard makes explanation using the C language as an example to
compile relevant functions and interfaces.
6 TCM application service
Work objects can be subdivided into authorized work objects and unauthorized
work objects. Unauthorized work objects include PCR composite objects and
hash objects, as shown in Figure 2.Authorized objects include TCM objects,
key objects, NV storage objects, migration data objects, encrypted data objects,
as shown in Figure 3.
7 TCM core services
Obtain event information of the specified PCR in the PCR event manager in the
TCS. It returns the specified PCR event information if pNumber has a specific
value. If it is NULL, it returns all event information of the specified PCR.
Obtain the PCR event information of the specified PCR from the start of the
specified event.
8 TDDL device driver library
Table 26 lists the error codes that appear in TDDL. In addition, the error code
associated with it is listed in each Tddli function definition (specific values can
be defined by the manufacturer).
This function directly passes the TCM command to the TCM device driver, so
that the TCM completes the corresponding operation. It also provides a channel
for the TCM parameters.
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of GM/T 0058-2018 be delivered?Answer: The full copy PDF of English version of GM/T 0058-2018 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of GM/T 0058-2018_English with my colleagues?Answer: Yes. The purchased PDF of GM/T 0058-2018_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GM/T 0058-2018 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.
How to buy and download a true PDF of English version of GM/T 0058-2018?A step-by-step guide to download PDF of GM/T 0058-2018_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD). Step 2: Search keyword "GM/T 0058-2018". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9
|