HOME Cart(0) Quotation About-Us Policies PDFs Standard-List
www.ChineseStandard.net Database: 189760 (5 Feb 2026)
Path: Home > GB/T Standards > Page 209 || Home > Standard-List > GB/T Standards > Page 209

National Standard: GB/T

(Page range: 1 ~ 731)
Std ID Description (Standard Title)
GB/T 28449-2018 Information security technology - Testing and evaluation process guide for classified protection of cyber security
GB/T 36629.3-2018 Information security technology -- Security technique requirements for citizen cyber electronic identity -- Part 3: Verification service message and processing rules
GB/T 36950-2018 Information security technology -- Security technical requirements of smart card (EAL4+)
GB/T 36951-2018 Information security technology -- Security technical requirements for application of sensing terminals in internet of things
GB/T 36957-2018 Information security technology -- Requirements for disaster recovery service
GB/T 36958-2018 Information security technology - Technical requirements of security management center for classified protection of cybersecurity
GB/T 36959-2018 Information security technology - Capability requirements and evaluation specification for assessment organization of classified protection of cybersecurity
GB/T 36960-2018 Information security technology -- Authentication and authorization -- Access control middleware framework and interface
GB/T 36968-2018 Information security technology -- Technical specification for IPSec VPN
GB/T 37002-2018 Information security technology -- Security techniques requirement for electronic mail system
GB/T 37024-2018 Information security technology -- Security technical requirements of gateway in sensing layer of the internet of things
GB/T 37025-2018 Information security technology -- Security technical requirements of data transmission for internet of things
GB/T 37027-2018 Information security technology -- Specifications of definition and description for network attack
GB/T 37033.1-2018 Information security technology -- Technical requirements for cryptographic application for radio frequency identification systems -- Part 1: Cryptographic protection framework and security levels
GB/T 37033.2-2018 Information security technology -- Technical requirements for cryptographic application for radio frequency identification systems -- Part 2: Technical requirements for cryptographic application for RF tag, reader and communication
GB/T 37033.3-2018 Information security technology -- Technical requirements for cryptographic application for radio frequency identification systems -- Part 3: Technical requirements for key management
GB/T 37044-2018 Information security technology -- Security reference model and generic requirements for internet of things
GB/T 37046-2018 Information security techniques -- Assessment criteria for disaster recovery service capability
GB/T 37076-2018 Information security technology -- Technical requirements for fingerprint recognition system
GB/T 37090-2018 Information security technology -- Security technical requirements, testing and evaluation methods for antivirus products
GB/T 37091-2018 Information security technology -- Security office USB disk technology requirement
GB/T 37092-2018 Information security technology -- Security requirements for cryptographic modules
GB/T 37093-2018 Information security technology -- Security requirements for IoT sensing layer access to communication network
GB/T 37094-2018 Information security technology -- Security management requirements for office information systems
GB/T 37095-2018 Information security technology -- Security basic technical requirements for office information systems
GB/T 37096-2018 Information security technology -- Security testing specification for office information systems
GB/T 35788-2017 Security technical requirement for the electronic identification of motor vehicles
GB/T 33561-2017 Information security technology -- Vulnerabilities classification
GB/T 32918.5-2017 Information security technology - Public key cryptographic algorithm SM2 based on elliptic curves - Part 5: Parameter definition
GB/T 33560-2017 Information security technology -- Cryptographic application identifier criterion specification
GB/T 33562-2017 Information security technology -- Secure domain name system deployment guide
GB/T 33563-2017 Information security technology -- Security technology requirements for wireless local area network (wlan) client (EAL2+)
GB/T 33565-2017 Information security technology -- Security technology requirements for wireless local area network (wlan) access system (EAL2+)
GB/T 33746.1-2017 Technical specification of NFC security -- Part 1: NFCIP-1 security services and protocol
GB/T 33746.2-2017 Technical specification of NFC security -- Part 2: Security mechanism requirements
GB/T 34095-2017 Information security technology -- Technology requirements for electronic payment of mobile terminal security based on short-range radio communication technology
GB/T 29246-2017 Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary
GB/T 34942-2017 Information security technology -- The assessment method for security capability of cloud computing service
GB/T 34953.1-2017 Information technology -- Security techniques -- Anonymous entity authentication -- Part 1: General
GB/T 34975-2017 Information security technology -- Security technical requirements and testing and evaluation approaches for application software of smart mobile terminals
GB/T 34976-2017 Information security technology -- Security technical requirements and testing and evaluation approaches for operating system of smart mobile terminals
GB/T 34977-2017 Information security technology -- Security technology requirements and testing and evaluation approaches for data storage of mobile intelligent terminals
GB/T 34978-2017 Information security technology -- Technology requirements for personal information protection of smart mobile terminal
GB/T 34990-2017 Information security technology -- Technical requirements and testing evaluation approaches of information system security management platform products
GB/T 35101-2017 Information security technology -- Smart card reader security technology requirements (EAL4+)
GB/T 35274-2017 Information security technology -- Security capability requirements for big data services
GB/T 35291-2017 Information security technology -- Cryptography token application interface specification
GB/T 15843.1-2017 Information technology -- Security techniques -- Entity authentication -- Part 1: General
GB/T 15843.2-2017 Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms
GB/T 35275-2017 Information security technology -- SM2 cryptographic algorithm encrypted signature message syntax specification
GB/T 35276-2017 Information security technology -- SM2 cryptography algorithm usage specification
GB/T 35277-2017 Information security technology -- Security technical requirements and testing and evaluation approaches for antivirus gateway products
GB/T 35278-2017 Information security technology -- Technical requirements for mobile terminal security protection
GB/T 35279-2017 Information security technology -- Security reference architecture of cloud computing
GB/T 35280-2017 Information security technology -- Requirement and code of conduct for security testing bodies of information technology products
GB/T 35281-2017 Information security technology -- Security technique requirements for application servers in mobile internet
GB/T 35282-2017 Information security technology -- Security technology specifications of mobile e-government system
GB/T 35283-2017 Information security techniques -- Specification for the structure of desktop core configuration baseline
GB/T 35284-2017 Information security technology -- Requirements and assessment methods for website identity and system security
GB/T 35285-2017 Information security technology -- Public key infrastructure -- Technical requirements for digital certificate based reliable electronic signature creation and verification
GB/T 35286-2017 Information security technology -- Air-interface security test specification for low-rate wireless personal area networks
GB/T 35287-2017 Information security technology -- Guidelines of trusted identity technology for website
GB/T 35288-2017 Information security technology -- Specification on the job skills of certificate authority employees
GB/T 35289-2017 Information security technology -- Specification on the service quality of certification authority
GB/T 35290-2017 Information security technology -- General requirement of security for radio frequency identification systems
GB/T 35787-2017 Security technical requirement for the read-write equipment of the electronic identification of motor vehicles
GB/T 20985.1-2017 Information technology -- Security techniques -- Information security incident management -- Part 1: Principles of incident management
GB/T 35273-2017 Information security technology -- Personal information security specification
GB/T 22080-2016 Information technology -- Security techniques -- Information security management systems -- Requirements
GB/T 22081-2016 Information technology -- Security techniques -- Code of practice for information security controls
GB/T 15843.3-2016 Information technology -- Security techniques -- Entity authentication -- Part 3: Mechanisms using digital signature techniques
GB/T 20276-2016 Information security technology -- Security requirements for embedded software in IC card with CPU
GB/T 22186-2016 Information security techniques -- Security technical requirements for IC card chip with CPU
GB/T 25067-2016 Information technology -- Security techniques -- Requirements for bodies providing audit and certification of information security management systems
GB/T 30269.601-2016 Information technology -- Sensor network -- Part 601: Information security: General technical specifications
GB/T 32905-2016 Information security techniques - SM3 cryptographic hash algorithm
GB/T 32907-2016 Information security technology - SM4 block cipher algorithm
GB/T 32914-2016 Information security technology -- Information security service provider management requirements
GB/T 32915-2016 Information security technology - Randomness test methods for binary sequence
GB/T 32917-2016 Information security technology -- Security technique requirements and testing and evaluation approaches for WEB application firewall
GB/T 32918.1-2016 Information security technology - Public key cryptographic algorithm SM2 based on elliptic curves - Part 1: General
GB/T 32918.2-2016 Information security technology - Public key cryptographic algorithm SM2 based on elliptic curves - Part 2: Digital signature algorithm
GB/T 32918.3-2016 Information security technology - Public key cryptographic algorithm SM2 based on elliptic curves - Part 3: Key exchange protocol
GB/T 32918.4-2016 Information security technology - Public key cryptographic algorithm SM2 based on elliptic curves - Part 4: Public key encryption algorithm
GB/T 32919-2016 Information security technology -- Application guide to industrial control system security control
GB/T 32920-2016 Information technology -- Security techniques -- Information security management for inter-sector and inter-organizational communications
GB/T 32921-2016 Information security technology - Security criterion on supplier conduct of information technology products
GB/T 32922-2016 Information security technology -- Baseline and implementation guide of IPSec VPN securing access
GB/T 32923-2016 Information technology -- Security techniques -- Governance of information security
GB/T 32924-2016 Information security technology - Guideline for cyber security warning
GB/T 32925-2016 Information security technology -- Basic security requirements for networked computer terminal of government
GB/T 32926-2016 Information security technology -- Information security management specification for government information technology service outsourcing
GB/T 32927-2016 Information security technology -- Security architecture of mobile smart terminal
GB/T 33131-2016 Information security technology -- Specification for IP storage network security based on IPSec
GB/T 33132-2016 Information security technology -- Guide of implementation for information security risk treatment
GB/T 33133.1-2016 Information security technology -- ZUC stream cipher algorithm -- Part 1: Algorithm description
GB/T 33134-2016 Information security technology -- Security requirement of public DNS service system
GB/T 18336.1-2015 Information technology -- Security techniques -- Evaluation criteria for IT security -- Part 1: Introduction and general model
GB/T 18336.2-2015 Information technology -- Security techniques -- Evaluation criteria for IT security -- Part 2: Security functional components
GB/T 18336.3-2015 Information technology -- Security techniques -- Evaluation criteria for IT security -- Part 3: Security assurance components
Terms of Service | Contact Information | Privacy Policy | Refund Policy | Shipping Policy