|
Std ID |
Description (Standard Title) |
|
GB/T 17903.3-2008
|
Information technology -- Security techniques -- Non-repudiation -- Part 3: Mechanisms using asymmetric techniques
|
|
GB/T 17964-2008
|
Information technology -- Security techniques -- Modes of operation for a block cipher
|
|
GB/T 18336.1-2008
|
IT security technology information technology security evaluation criteria -- Part 1: Introduction and general model
|
|
GB/T 18336.2-2008
|
IT security technology information technology security evaluation criteria -- Part 2: Security functional requirements
|
|
GB/T 18336.3-2008
|
IT security technology information technology security evaluation criteria -- Part 3: Security assurance requirements
|
|
GB/T 22080-2008
|
Information technology -- Security techniques -- Information security management systems -- Requirements
|
|
GB/T 22081-2008
|
Information technology -- Security techniques -- Code of practice for information security management
|
|
GB/T 22186-2008
|
Information Security techniques -- Security technical requirements for IC card chip with CPU (EAL4+)
|
|
GB/T 22240-2008
|
Information security technology -- Classification guide for classified protection of information system security
|
|
GB/T 18018-2007
|
Information security technology -- Technical requirements for router security
|
|
GB/T 20945-2007
|
Information security technology information system security auditing product technical requirements and testing and evaluation methods
|
|
GB/T 20979-2007
|
Information security technology -- Technical requirements for iris recognition system
|
|
GB/T 20983-2007
|
Information security technology -- Evaluation criteria for online banking system information security assurance
|
|
GB/T 20984-2007
|
Information security technology -- Risk assessment specification for information security
|
|
GB/T 20987-2007
|
Information security technology -- Evaluation criteria for online securities trading system information security assurance
|
|
GB/T 20988-2007
|
Information security technology - Disaster recovery specifications for information systems
|
|
GB/T 21028-2007
|
Information security technology -- Security techniques requirement for server
|
|
GB/T 21050-2007
|
Information security techniques -- Security requirements for network switch (EAL3)
|
|
GB/T 21052-2007
|
Information security technology -- Physical security technical requirement for information system
|
|
GB/T 21053-2007
|
Information security techniques -- Public key infrastructure -- Technology requirement for security classification protection of PKI system
|
|
GB/T 21054-2007
|
Information security techniques -- Public key infrastructure -- Evaluation criteria for security classification protection of PKI system
|
|
GB/T 20269-2006
|
Information security technology -- Information system security management requirements
|
|
GB/T 20270-2006
|
Information security technology -- Basis security techniques requirement for network
|
|
GB/T 20271-2006
|
Information security technology -- Common security techniques requirement for information system
|
|
GB/T 20272-2006
|
Information security technology -- Security techniques requirement for operating system
|
|
GB/T 20273-2006
|
Information security technology -- Security techniques requirement for database management system
|
|
GB/T 20274.1-2006
|
Information security technology -- Evaluation framework for information systems security assurance -- Part 1: Introduction and general model
|
|
GB/T 20280-2006
|
Information security technology -- Testing and evaluation approaches for network vulnerability scanners
|
|
GB/T 20261-2006
|
Information technology -- Systems security engineering -- Capability maturity model
|
|
GB/T 20275-2006
|
Technical requirements and testing methods of information security technology intrusion detection system
|
|
GB/T 20276-2006
|
Information security technology -- Security requirements for smartcard embedded software (EAL4+)
|
|
GB/T 20277-2006
|
Information security technology network and terminal equipment isolation component testing and evaluation methods
|
|
GB/T 20278-2006
|
The technical requirements of the information security technology for network vulnerability scanning products
|
|
GB/T 20279-2006
|
Safety technology requirements for information security, network and terminal equipment across the high parts
|
|
GB/T 20281-2006
|
Information security technology Firewall technical requirements and test evaluation method
|
|
GB/T 20519-2006
|
Information security technology -- Public key infrastructures -- Privilege management center technical specification
|
|
GB/T 20520-2006
|
Information security technology - Public key infrastructure - Time stamp specification
|
|
GB/T 15843.5-2005
|
Information technology -- Security technique -- Entity authentication -- Part 5: Mechanisms using zero knowledge techniques
|
|
GB/T 17902.2-2005
|
Information technology -- Security techniques -- Digital signatures with appendix -- Part 2: Identity-based mechanisms
|
|
GB/T 17902.3-2005
|
Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Certificate-based mechanisms
|
|
GB/T 19715.1-2005
|
Information technology -- Guidelines for the management of IT security -- Part 1: Concepts and models of IT security
|
|
GB/T 19715.2-2005
|
Information technology -- Guidelines for the management of IT security -- Part 2: Managing and planning IT security
|
|
GB/T 19716-2005
|
IT information security management
|
|
GB/T 18238.2-2002
|
Information technology -- Security techniques -- Hash-functions -- Part 2: Hash-functions using an n-bit block cipher
|
|
GB/T 18238.3-2002
|
Information technology -- Security techniques -- Hash-functions -- Part 3: Dedicated hash-functions
|
|
GB/T 17964-2000
|
IT security technology n-bit block cipher mode of operation
|
|
GB/T 18238.1-2000
|
Information technology. Security techniques. Hash-function. Part 1: General
|
|
GB/T 15843.1-1999
|
Information technology-Security techniques-Entity authentication-Part 1: General
|
|
GB/T 15843.4-1999
|
Information technology-Security techniques-Entity authentication-Part 4: Mechanisms using a cryptographic check function
|
|
GB/T 17900-1999
|
Security technical requirements for proxy server
|
|
GB/T 17901.1-1999
|
Information technology. Security techniques. Key management. Part 1: Framework
|
|
GB/T 17902.1-1999
|
Information technology. Security techniques. Digital signature with appendix. Part 1: General
|
|
GB/T 17903.1-1999
|
Information technology-Security techniques-Non-repudiation-Part 1: General
|
|
GB/T 17903.2-1999
|
Information technology-Security techniques-Non-repudiation-Part 2: Mechanisms using symmetric techniques
|
|
GB/T 17903.3-1999
|
Information technology-Security techniques-Non-repudiation-Part 3: Mechanisms using asymmetric techniques
|
|
GB/T 18018-1999
|
Security requirements for router
|
|
GB/T 18019-1999
|
Information technology-Security requirements for packet filter firewalls
|
|
GB/T 18020-1999
|
Information technology-Security requirements for application level firewall
|
|
GB/T 15843.3-1998
|
Information technology--Security techniques--Entity authentication--Part 3: Mechanisms using asymmetric signature techniques
|
|
GB/T 15277-1994
|
Information processing--Modes of operation for a 64-bit block cipher algorithm
|
|
GB/T 15278-1994
|
Information processing. Data encipherment. Physical layer interoperability requirements
|
|
GB/T 45225-2025
|
Artificial intelligence - Deep learning algorithms evaluation
|
|
GB/T 16262.1-2025
|
Information technology - Abstract Syntax Notation One(ASN.1) - Part 1: Specification of basic notation
|
|
GB/T 16262.2-2025
|
Information technology - Abstract Syntax Notation One (ASN.1) - Part 2: Information object specification
|
|
GB/T 16262.3-2025
|
Information technology - Abstract Syntax Notation One (ASN.1) - Part 3: Constraint specification
|
|
GB/T 16262.4-2025
|
Information technology - Abstract Syntax Notation One(ASN.1) - Part 4: Parameterization of ASN.1 specifications
|
|
GB/T 35319-2025
|
Internet of things - System interface requirements
|
|
GB/T 41780.3-2025
|
Internet of things - Edge computing - Part 3: Node interface requirements
|
|
GB/T 16263.1-2025
|
Information technology - ASN.1 encoding rules - Part 1: Specification of Basic Encoding Rules(BER), Canonical Encoding Rules(CER) and Distinguished Encoding Rules(DER)
|
|
GB/T 16263.2-2025
|
Information technology - ASN.1 encoding rules - Part 2: Specification of Packed Encoding Rules (PER)
|
|
GB/T 16263.4-2025
|
Information technology - ASN.1 encoding rules - Part 4: XML Encoding Rules (XER)
|
|
GB/T 16263.5-2025
|
Information technology - ASN.1 encoding rules - Part 5: Mapping W3C XML schema definitions into ASN.1
|
|
GB/T 33474-2025
|
Internet of things - Reference architecture
|
|
GB/T 33745-2025
|
Internet of things - Terminology
|
|
GB/T 45728-2025
|
Internet of things - Crowd-sensing - Technical architecture
|
|
GB/T 46456.1-2025
|
Interconnection of information technology equipment - Interconnection and intercommunication of smart home - Part 1: Architecture and general requirements
|
|
GB/T 46456.2-2025
|
Interconnection of information technology equipment - Interconnection and intercommunication of smart home - Part 2: Test method
|
|
GB/T 46456.3-2025
|
Interconnection of information technology equipment - Interconnection and intercommunication of smart home - Part 3: General requirements for local interconnection
|
|
GB/T 45987-2025
|
Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements - Frame replication and elimination for reliability
|
|
GB/T 46012-2025
|
Forestry and grassland internet of things - Architecture and interface requirements
|
|
GB/T 43781-2024
|
Information technology - Telecommunications and information exchange between systems - Requirement for video to video network system
|
|
GB/T 43862-2024
|
Technical requirements of smart television interactive application interface
|
|
GB/T 17969.8-2024
|
Information technology - Procedures for the operation of object identifier registration authorities - Part 8: Generation of universally unique identifiers(UUIDs) and their use in object identifiers
|
|
GB/T 41780.2-2024
|
Internet of things - Edge computing - Part 2: Data management requirements
|
|
GB/T 44121-2024
|
Intelligent manufacturing - Requirements of identification and resolution system
|
|
GB/T 41782.3-2024
|
Internet of things - Interoperability for systems - Part 3: Semantic interoperability
|
|
GB/T 41782.4-2024
|
Internet of things - Interoperability for systems - Part 4: Syntactic interoperability
|
|
GB/T 44220-2024
|
Interface of virtual reality equipment - Positioning equipment
|
|
GB/T 44249.1-2024
|
Internet of things system for offshore oil and gas producing - Part 1: General requirements
|
|
GB/T 44252.1-2024
|
Internet of things - Sports health monitoring equipment - Part 1: Data classification and description
|
|
GB/T 32399-2024
|
Information technology - Cloud computing - Reference architecture
|
|
GB/T 44283-2024
|
Internet of Things - Framework for semantic interoperation implementation
|
|
GB/T 44284.1-2024
|
Information technology - Telecommunications and information exchange between systems - Time sensitive networking and wireless networking interconnection - Part 1: Architecture and interface requirements
|
|
GB/T 44445-2024
|
General specification for minors protection of smart mobile terminal
|
|
GB/T 45082-2024
|
Internet of things - General technical requirements for ubiquitous-terminal operating system
|
|
GB/T 44809-2024
|
Internet of things(IoT) - Compatibility requirements and model for devices within industrial IoT systems
|
|
GB/T 44817-2024
|
Information technology - Telecommunications and information exchange between systems - Virtual bridged local area networks bridge port extension
|
|
GB/T 44865-2024
|
Internet of things(IoT) - System requirements of IoT and sensor network technology-based integrated platform for chattel asset monitoring
|
|
GB/T 44812-2024
|
Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Bridges and bridged networks
|
|
GB/T 28787-2023
|
Data communication protocol between intelligent terminal and dispatching center for urban bus and trolleybus
|