HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (17 Jan 2026)
Path: Home > GB/T > Page 206                                      Home > Standard_List > GB/T > Page 206
   

Chinese National Standard: GB/T

Previous << 206 >> Next
Std ID Description (Standard Title) Detail
GB/T 44247-2024 Information technology - Augmented reality - Software component interface GB/T 44247-2024
GB/T 28170.2-2021 Information technology - Computer graphics and image processing - Extensible 3D (X3D) - Part 2: Scene access interface(SAI) GB/T 28170.2-2021
GB/T 36341.2-2018 Information technology -- Information representation of shape modeling -- Part 2: Feature constraint GB/T 36341.2-2018
GB/T 36341.3-2018 Information technology -- Information presentation of shape modeling -- Part 3: Streaming transmission GB/T 36341.3-2018
GB/T 36341.4-2018 Information technology -- Information presentation of shape modeling -- Part 4: Storage format GB/T 36341.4-2018
GB/T 36341.1-2018 Information technology -- Information representation of shape modeling -- Part 1: Framework and basic component GB/T 36341.1-2018
GB/T 28170.1-2011 Information technology -- Computer graphics and image processing -- Extensible 3D (X3D) -- Part 1: Architecture and base component GB/T 28170.1-2011
GB/T 17192.5-2000 Information technology. Computer graphics. Interfacing techniques for dialogues with graphical devices (CGI). Functional specification. Part 5: Input and echoing GB/T 17192.5-2000
GB/T 17192.6-2000 Information technology. Computer graphics. Interfacing techniques for dialogues with graphical devices (CGI). Functional specification. Part 6: Raster GB/T 17192.6-2000
GB/T 18232-2000 Information technology. Computer graphics and image processing. Procedures for registration of graphical items GB/T 18232-2000
GB/T 17192.4-1998 Information technology. Computer graphics. Interfacing techniques for dialogues with graphical devices (CGI). Functional specification. Part 4: Segment GB/T 17192.4-1998
GB/T 17555-1998 Information technology. Computer graphics and image processing. Conformance testing of implementations of graphics standards GB/T 17555-1998
GB/T 17151.1-1997 Information processing systems--Computer graphics--ProgrammerHierarchical Interactive Graphics System (PHIGS). Part 1: Functional description GB/T 17151.1-1997
GB/T 17151.2-1997 Information processing system--Computer graphics-- ProgrammerHierarchical Interactive Graphics System (PHIGS). Part 2: Archive file format GB/T 17151.2-1997
GB/T 17151.3-1997 Information processing systems--Computer graphics--ProgrammerHierarchical Interactive Graphics System (PHIGS). Part 3: Clear-text encoding of archive file GB/T 17151.3-1997
GB/T 17192.1-1997 Information technology. Computer graphics. Interfacing techniques for dialogues with graphical devices (CGI). Part 1: Overview, profile, and conformance GB/T 17192.1-1997
GB/T 17192.2-1997 Information technology. Computer graphics. Interfacing techniques for dialogues with graphical devices (CGI). Functional specification. Part 2: Control GB/T 17192.2-1997
GB/T 17192.3-1997 Information technology. Computer graphics. Interfacing techniques for dialogues with graphical devices (CGI). Functional specification. Part 3: Output GB/T 17192.3-1997
GB/T 15121.3-1996 Information technology. Computer graphics. Metafile for storage and transferof picture description information. Part 3: Binary encoding GB/T 15121.3-1996
GB/T 15121.4-1996 Information technology. Computer graphics. Metafile for storage and transfer of picture description information. Part 4: Clear text encoding GB/T 15121.4-1996
GB/T 15121.1-1994 Information processing systems. Computer graphics. Metafile for storage and transfer of picture description information. Part 1: Functional specification GB/T 15121.1-1994
GB/T 15121.2-1994 Information processing systems--Computer graphics--Metafile for storage and transfer of picture description information--Part 2: Character encoding GB/T 15121.2-1994
GB/T 9544-1988 Information processing systems. Computer graphics. Graphical kernel system (GKS) functional description GB/T 9544-1988
GB/T 19713-2025 Cybersecurity technology - Public key infrastructure - Online certificate status protocol GB/T 19713-2025
GB/T 37027-2025 Cybersecurity technology - Criteria for determing network attack and network attack incident GB/T 37027-2025
GB/T 43710-2025 Requirements for auditing of scientific data security GB/T 43710-2025
GB/T 45230-2025 Data security technology - General framework for confidential computing GB/T 45230-2025
GB/T 45240-2025 General requirements for device-independent quantum random number generators GB/T 45240-2025
GB/T 45389-2025 Data security technology - Capability requirements for assessment organization of data security GB/T 45389-2025
GB/T 45392-2025 Data security technology - Security requirements for automated decision making based on personal information GB/T 45392-2025
GB/T 45396-2025 Data security technology - Security requirements for government data processing GB/T 45396-2025
GB/T 45404-2025 Data security technology - Requirements for large Internet companies internal personal information protection supervision agency GB/T 45404-2025
GB/T 45406-2025 Security technical requirements for critical network devices - Programmable logic controller(PLC) GB/T 45406-2025
GB/T 45409-2025 Cybersecurity technology - Technical specifications for operation and maintenance security management products GB/T 45409-2025
GB/T 45574-2025 Data security technology - Security requirements for processing of sensitive personal information GB/T 45574-2025
GB/T 45576-2025 Cybersecurity technology - Guidelines for application of cybersecurity insurance GB/T 45576-2025
GB/T 45577-2025 Data security technology - Risk assessment method for data security GB/T 45577-2025
GB/T 45652-2025 Cybersecurity technology - Security specification for generative artificial intelligence pre-training and fine-tuning data GB/T 45652-2025
GB/T 45654-2025 Cybersecurity technology - Basic security requirements for generative artificial intelligence service GB/T 45654-2025
GB/T 45674-2025 Cybersecurity technology - Generative artificial intelligence data annotation security specification GB/T 45674-2025
GB/T 20988-2025 Cybersecurity technology - Disaster recovery specifications for information systems GB/T 20988-2025
GB/T 22080-2025 Cybersecurity technology - Information security management systems - Requirements GB/T 22080-2025
GB/T 45909-2025 Cybersecurity technology - Implementation guideline of digital watermarking technology GB/T 45909-2025
GB/T 19771-2025 Cybersecurity technology - Public key infrastructure - Specification for minimum interoperability for PKI components GB/T 19771-2025
GB/T 20520-2025 Cybersecurity technology - Public key infrastructure - Specification for time stamp GB/T 20520-2025
GB/T 31722-2025 Cybersecurity technology - Guidance on managing information security risks GB/T 31722-2025
GB/T 45958-2025 Cybersecurity technology - Security framework for artificial intelligence computing platform GB/T 45958-2025
GB/T 46068-2025 Data security technology - Security certification requirements for cross-border processing activity of personal information GB/T 46068-2025
GB/T 46071-2025 Data security technology - Guidance on social responsibility of data security and personal information protection GB/T 46071-2025
GB/T 34942-2025 Cybersecurity technology - The assessment method for security capability of cloud computing service GB/T 34942-2025
GB/T 19714-2025 Cybersecurity technology - Public key infrastructure - Certificate management protocol GB/T 19714-2025
GB/T 45940-2025 Cybersecurity technology - Implementation guide of cybersecurity operation and maintenance GB/T 45940-2025
GB/T 15843.4-2024 Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function GB/T 15843.4-2024
GB/T 17903.1-2024 Information technology - Security techniques - Non-repudiation - Part 1: General GB/T 17903.1-2024
GB/T 17903.3-2024 Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques GB/T 17903.3-2024
GB/T 18336.1-2024 Cybersecurity technology - Evaluation criteria for IT security - Part 1: Introduction and general model GB/T 18336.1-2024
GB/T 18336.2-2024 Cybersecurity technology - Evaluation criteria for IT security - Part 2: Security functional components GB/T 18336.2-2024
GB/T 18336.3-2024 Cybersecurity technology - Evaluation criteria for IT security - Part 3: Security assurance components GB/T 18336.3-2024
GB/T 18336.4-2024 Cybersecurity technology - Evaluation criteria for IT security - Part 4: Framework for specification of evaluation methods and activities GB/T 18336.4-2024
GB/T 18336.5-2024 Cybersecurity technology - Evaluation criteria for IT security - Part 5: Pre-defined packages of security requirements GB/T 18336.5-2024
GB/T 30270-2024 Cybersecurity technology - Methodology for IT security evaluation GB/T 30270-2024
GB/T 31497-2024 Information technology - Security techniques - Information security management - Monitoring, measurement, analysis and evaluation GB/T 31497-2024
GB/T 33563-2024 Cybersecurity technology - Security technology requirements for wireless local area network client GB/T 33563-2024
GB/T 33565-2024 Cybersecurity technology - Security technology requirements for wireless local area network access system GB/T 33565-2024
GB/T 43694-2024 Cybersecurity technology - Certificate application integrated service interface specification GB/T 43694-2024
GB/T 43696-2024 Cybersecurity security technology - Zero trust reference architecture GB/T 43696-2024
GB/T 43697-2024 Data security technology - Rules for data classification and grading GB/T 43697-2024
GB/T 43698-2024 Cybersecurity technology - Security requirements for software supply chain GB/T 43698-2024
GB/T 43739-2024 Cybersecurity technology - Audit and management guide for personal information processing normativeness of mobile internet applications in App stores GB/T 43739-2024
GB/T 43741-2024 Cybersecurity technology - Requirements for crowdsourcing security test services GB/T 43741-2024
GB/T 43779-2024 Cybersecurity technology - Technical specification for caller identity authentication using crypto tokens GB/T 43779-2024
GB/T 43844-2024 IPv6 address assignment and coding rules - Interface identifier GB/T 43844-2024
GB/T 43848-2024 Cybersecurity technology - Evaluation method for open source code security of software products GB/T 43848-2024
GB/T 15843.2-2024 Cybersecurity technology - Entity authentication - Part 2: Mechanisms using authenticated encryption GB/T 15843.2-2024
GB/T 15852.2-2024 Cybersecurity technology - Message authentication codes(MACs) - Part 2: Mechanisms using a dedicated hash-function GB/T 15852.2-2024
GB/T 18238.1-2024 Cybersecurity technology - Hash-functions - Part 1: General GB/T 18238.1-2024
GB/T 18238.2-2024 Cybersecurity technology - Hash-functions - Part 2: Hash-functions using a block cipher GB/T 18238.2-2024
GB/T 18238.3-2024 Cybersecurity technology - Hash-functions - Part 3: Dedicated hash-functions GB/T 18238.3-2024
GB/T 20279-2024 Cybersecurity technology - Technical specification for network and terminal separation products GB/T 20279-2024
GB/T 22081-2024 Cybersecurity technology - Information security controls GB/T 22081-2024
GB/T 29244-2024 Cybersecurity technology - Security specification for office devices GB/T 29244-2024
GB/T 44588-2024 Data security technology - Personal information processing rules of internet platforms, products and services GB/T 44588-2024
GB/T 44602-2024 Cybersecurity technology - Cybersecurity technical specification for smart lock products GB/T 44602-2024
GB/T 30278-2024 Cybersecurity technology - Government client computer core configuration specifications GB/T 30278-2024
GB/T 44886.1-2024 Cybersecurity technology - Cybersecurity product interconnectivity - Part 1: Framework GB/T 44886.1-2024
GB/T 29240-2024 Cybersecurity technology - General security technical specification for terminal computer GB/T 29240-2024
GB/T 31500-2024 Cybersecurity technology - Security specification of data recovery service for storage media GB/T 31500-2024
GB/T 44862-2024 Cybersecurity technology - Cyber-resilience evaluation criteria GB/T 44862-2024
GB/T 15843.3-2023 Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques GB/T 15843.3-2023
GB/T 17902.1-2023 Information technology - Security techniques - Digital signatures with appendix - Part 1: General GB/T 17902.1-2023
GB/T 20274.1-2023 Information security technology - Evaluation framework for information systems security assurance - Part 1: Introduction and general model GB/T 20274.1-2023
GB/T 21053-2023 Information security techniques - Public key infrastructure - Security technology requirement for PKI system GB/T 21053-2023
GB/T 21054-2023 Information security techniques - Public key infrastructure - Security testing assessment approaches for PKI system GB/T 21054-2023
GB/T 32922-2023 Information security technology - Baseline and implementation guide of IPSec VPN securing access GB/T 32922-2023
GB/T 33134-2023 Information security technology - Security requirement of public domain name service system GB/T 33134-2023
GB/T 42446-2023 Information security technology - Basic requirements for competence of cybersecurity workforce GB/T 42446-2023
GB/T 42447-2023 Information security technology - Data security guidelines for telecom field GB/T 42447-2023
GB/T 42453-2023 Information security technology - General technical requirements for network security situation awareness GB/T 42453-2023
GB/T 42460-2023 Information security technology - Guide for evaluating the effectiveness of personal information de-identification GB/T 42460-2023
GB/T 42461-2023 Information security technology - Guidelines for cyber security service cost measurement GB/T 42461-2023
Previous << 206 >> Next

Refund Policy     Privacy Policy     Terms of Service     Shipping Policy     Contact Information