HOME Cart(0) Quotation About-Us Policies PDFs Standard-List
www.ChineseStandard.net Database: 189760 (5 Feb 2026)
Path: Home > GB/T Standards > Page 208 || Home > Standard-List > GB/T Standards > Page 208

National Standard: GB/T

(Page range: 1 ~ 731)
Std ID Description (Standard Title)
GB/T 38626-2020 Information security technology - Guide to password protection for intelligent connected device
GB/T 38628-2020 Information security technology - Cybersecurity guide for automotive electronics system
GB/T 38629-2020 Information security technology - Technical specifications for signature verification server
GB/T 38631-2020 Information technology - Security techniques - Sector-specific application of GB/T 22080 - Requirements
GB/T 38632-2020 Information security technology - Security requirements for application of intelligent audio-video recording device
GB/T 38635.1-2020 Information security technology - Identity-based cryptographic algorithms SM9 - Part 1: General
GB/T 38635.2-2020 Information security technology - Identity-based cryptographic algorithms SM9 - Part 2: Algorithms
GB/T 38636-2020 Information security technology - Transport layer cryptography protocol (TLCP)
GB/T 38638-2020 Information security technology - Trusted computing - Architecture of trusted computing
GB/T 38644-2020 Information security technology - Trusted computing - Testing method of trusted connect
GB/T 38645-2020 Information security techniques - Guide for cybersecurity incident emergency exercises
GB/T 38646-2020 Information security technology - Technical requirements of mobile signature service
GB/T 38647.1-2020 Information technology - Security techniques - Anonymous digital signatures - Part 1: General
GB/T 38647.2-2020 Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key
GB/T 38648-2020 Information security techniques - Guideline to bluetooth security
GB/T 38671-2020 Information Security Technology - Technical Requirements for Remote Face Recognition System
GB/T 38674-2020 Information security technology - Guideline on secure coding of application software
GB/T 20283-2020 Information security technology - Guide for the production of protection profiles and security targets
GB/T 39205-2020 Information security technology - Light-weight authentication and access control mechanism
GB/T 20261-2020 Information security technology. System security engineering. Capability maturity model
GB/T 25061-2020 Information security technology. XML digital signature syntax and processing specification
GB/T 25068.1-2020 Information technology. Security techniques. Network security - Part 1: Overview and concepts
GB/T 25068.2-2020 Information technology - Security techniques - Network security - Part 2: Guidelines for the design and implementation of network security
GB/T 28458-2020 Information security technology - Cybersecurity vulnerability identification and description specification
GB/T 30276-2020 Information security technology - Specification for cybersecurity vulnerability management
GB/T 30279-2020 Information security technology - Guidelines for categorization and classification of cybersecurity vulnerability
GB/T 39276-2020 Information security technology - General security requirements of network products and services
GB/T 39335-2020 Information security technology - Guidance for personal information security impact assessment
GB/T 39412-2020 Information security technology. Audit specification of code security
GB/T 15852.1-2020 Information technology. Security techniques-Message authentication codes - Part 1: Mechanisms using a block cipher
GB/T 20985.2-2020 Information technology - Security techniques - Information security incident management - Part 2: Guidelines to plan and prepare for incident response
GB/T 39680-2020 Information security technology - Technique requirements and evaluation criteria for server security
GB/T 39720-2020 Information security technology. Security technical requirements and test evaluation approaches for smart mobile terminal
GB/T 39725-2020 Information security technology - Guide for health data security
GB/T 39477-2020 (Information security technology Government information sharing Data security technical requirements)
GB/T 22239-2019 Information security technology - Baseline for classified protection of cybersecurity
GB/T 25070-2019 Information security technology - Technical requirements of security design for classified protection of cybersecurity
GB/T 28448-2019 Information security technology - Evaluation requirement for classified protection of cybersecurity
GB/T 15852.3-2019 Information technology -- Security techniques -- Message authentication codes (MACs) -- Part 3: Mechanisms using a universal hash-function
GB/T 18018-2019 Information security technology - Technical requirement for router security
GB/T 20009-2019 Information security technology - Security evaluation criteria for database management system
GB/T 20272-2019 Information security technology - Security technical requirements for operating system
GB/T 20273-2019 Information Security Technology - Security Technical Requirements for Database Management System
GB/T 20979-2019 Information security technology - Technical requirements for iris recognition system
GB/T 21050-2019 Information security technology - Security requirements for network switch
GB/T 25058-2019 Information Security Technology - Implementation Guide for Classified Protection of Cybersecurity
GB/T 37931-2019 Information security technology - Security technology requirements and testing and evaluation approaches for Web application security detection system
GB/T 37932-2019 Information security technology - Security requirements for data transaction service
GB/T 37933-2019 Information security technology - Technical requirements of industrial control system dedicated firewall
GB/T 37934-2019 Information security technology - Security technical requirements of industrial control system security isolation and information ferry system
GB/T 37935-2019 Information security technology - Trusted computing specification - Trusted software base
GB/T 37939-2019 Information security technology - Security techniques requirement for network storage
GB/T 37941-2019 Information security technology - Security technical requirements of industrial control system network audit products
GB/T 37950-2019 Information security technology - Security technical requirements for desktop cloud
GB/T 37952-2019 Information security technology - Technical requirements of mobile terminal security management platform
GB/T 37953-2019 Information security technology - Security requirements and evaluation approaches for industrial control network monitor
GB/T 37954-2019 Information security technology - Technique requirements and testing and evaluation approaches for industrial control system vulnerability detection products
GB/T 37955-2019 Information security technology - Security technique requirements for numerical control network
GB/T 37956-2019 Information security technology - Technology requirement for website security cloud protection platform
GB/T 37962-2019 Information security technology - Common criteria for industrial control system products security
GB/T 37964-2019 Information security technology - Guide for de-identifying personal information
GB/T 37971-2019 Information security technology - Framework of smart city security system
GB/T 37972-2019 Information security technology - Operation supervision framework of cloud computing service
GB/T 37973-2019 Information security technology - Big data security management guide
GB/T 37980-2019 Information security technology - Guide for security inspection of industrial control systems
GB/T 37985-2019 Technical Requirements for Key Management System for the Electronic Identification of Motor Vehicles
GB/T 37988-2019 Information security technology - Data security capability maturity model
GB/T 38249-2019 Information security technology - Security guide of cloud computing services for government website
GB/T 27422-2019 Conformity assessment - Requirements for bodies providing audit and certification of business continuity management systems
GB/T 36322-2018 Information security technology -- Cryptographic device application interface specifications
GB/T 36324-2018 Information security technology -- Information security classification specifications of industrial control systems
GB/T 20518-2018 Information security technology -- Public key infrastructure -- Digital certificate format
GB/T 36323-2018 Information security technology -- Security management fundamental requirements for industrial control systems
GB/T 36466-2018 Information security technology -- Implementation guide to risk assessment of industrial control systems
GB/T 25056-2018 Information security technology -- Specifications of cryptograph and related security technology for certificate authentication system
GB/T 36470-2018 Information security technology -- Common security functional requirements for data acquisition and control field devices of industrial control systems
GB/T 15843.6-2018 Information technology -- Security techniques -- Entity authentication -- Part 6: Mechanisms using manual data transfer
GB/T 34953.2-2018 Information technology -- Security techniques -- Anonymous entity authentication -- Part 2: Mechanisms based on signatures using a group public key
GB/T 36618-2018 Information security technology -- Specification for financial information service security
GB/T 36619-2018 Information security technology -- Naming specification on domain names of Chinese government organs and public institutions
GB/T 36624-2018 Information technology -- Security techniques -- Authenticated encryption
GB/T 36626-2018 Information security technology -- Management guide for secure operation and maintenance of information systems
GB/T 36627-2018 Information security technology - Testing and evaluation technical guide for classified cybersecurity protection
GB/T 36629.1-2018 Information security technology -- Security technique requirements for citizen cyber electronic identity -- Part 1: Security technique requirements for reader
GB/T 36629.2-2018 Information security technology -- Security technique requirements for citizen cyber electronic identity -- Part 2: Security technique requirements of carrier
GB/T 36630.1-2018 Information Security Technology - Controllability Evaluation Index for Security of Information Technology Products - Part 1: General Principles
GB/T 36630.2-2018 Information security technology -- Controllability evaluation index for security of information technology products -- Part 2: Central processing unit
GB/T 36630.3-2018 Information security technology -- Controllability evaluation index for security of information technology products -- Part 3: Operating system
GB/T 36630.4-2018 Information security technology -- Controllability evaluation index for security of information technology products -- Part 4: Office suite
GB/T 36630.5-2018 Information security technology -- Controllability evaluation index for security of information technology products -- Part 5: General purpose computer
GB/T 36631-2018 Information security technology -- Time stamp policy and time stamp practice rules
GB/T 36632-2018 Information security technology -- Format specifications for citizen cyber electronic identity
GB/T 36633-2018 Information security technology -- Technical guide for identity authentication over network
GB/T 36635-2018 Information security technology - Basic requirements and implementation guide of network security monitoring
GB/T 36637-2018 Information security technology -- Guidelines for the information and communication technology supply chain risk management
GB/T 36639-2018 Information security technology -- Trusted computing specification -- Trusted support platform for server
GB/T 36643-2018 Information security technology -- Cyber security threat information format
GB/T 36644-2018 Information security technology - Methods for obtaining security attestations for digital signature applications
GB/T 36651-2018 Information security techniques - Biometric authentication protocol framework based on trusted environment
GB/T 15851.3-2018 Information technology -- Security techniques -- Digital signature schemes giving message recovery -- Part 3: Discrete logarithm based mechanisms
Terms of Service | Contact Information | Privacy Policy | Refund Policy | Shipping Policy