|
Std ID |
Description (Standard Title) |
Detail |
|
GB/T 44247-2024
|
Information technology - Augmented reality - Software component interface
|
GB/T 44247-2024
|
|
GB/T 28170.2-2021
|
Information technology - Computer graphics and image processing - Extensible 3D (X3D) - Part 2: Scene access interface(SAI)
|
GB/T 28170.2-2021
|
|
GB/T 36341.2-2018
|
Information technology -- Information representation of shape modeling -- Part 2: Feature constraint
|
GB/T 36341.2-2018
|
|
GB/T 36341.3-2018
|
Information technology -- Information presentation of shape modeling -- Part 3: Streaming transmission
|
GB/T 36341.3-2018
|
|
GB/T 36341.4-2018
|
Information technology -- Information presentation of shape modeling -- Part 4: Storage format
|
GB/T 36341.4-2018
|
|
GB/T 36341.1-2018
|
Information technology -- Information representation of shape modeling -- Part 1: Framework and basic component
|
GB/T 36341.1-2018
|
|
GB/T 28170.1-2011
|
Information technology -- Computer graphics and image processing -- Extensible 3D (X3D) -- Part 1: Architecture and base component
|
GB/T 28170.1-2011
|
|
GB/T 17192.5-2000
|
Information technology. Computer graphics. Interfacing techniques for dialogues with graphical devices (CGI). Functional specification. Part 5: Input and echoing
|
GB/T 17192.5-2000
|
|
GB/T 17192.6-2000
|
Information technology. Computer graphics. Interfacing techniques for dialogues with graphical devices (CGI). Functional specification. Part 6: Raster
|
GB/T 17192.6-2000
|
|
GB/T 18232-2000
|
Information technology. Computer graphics and image processing. Procedures for registration of graphical items
|
GB/T 18232-2000
|
|
GB/T 17192.4-1998
|
Information technology. Computer graphics. Interfacing techniques for dialogues with graphical devices (CGI). Functional specification. Part 4: Segment
|
GB/T 17192.4-1998
|
|
GB/T 17555-1998
|
Information technology. Computer graphics and image processing. Conformance testing of implementations of graphics standards
|
GB/T 17555-1998
|
|
GB/T 17151.1-1997
|
Information processing systems--Computer graphics--ProgrammerHierarchical Interactive Graphics System (PHIGS). Part 1: Functional description
|
GB/T 17151.1-1997
|
|
GB/T 17151.2-1997
|
Information processing system--Computer graphics-- ProgrammerHierarchical Interactive Graphics System (PHIGS). Part 2: Archive file format
|
GB/T 17151.2-1997
|
|
GB/T 17151.3-1997
|
Information processing systems--Computer graphics--ProgrammerHierarchical Interactive Graphics System (PHIGS). Part 3: Clear-text encoding of archive file
|
GB/T 17151.3-1997
|
|
GB/T 17192.1-1997
|
Information technology. Computer graphics. Interfacing techniques for dialogues with graphical devices (CGI). Part 1: Overview, profile, and conformance
|
GB/T 17192.1-1997
|
|
GB/T 17192.2-1997
|
Information technology. Computer graphics. Interfacing techniques for dialogues with graphical devices (CGI). Functional specification. Part 2: Control
|
GB/T 17192.2-1997
|
|
GB/T 17192.3-1997
|
Information technology. Computer graphics. Interfacing techniques for dialogues with graphical devices (CGI). Functional specification. Part 3: Output
|
GB/T 17192.3-1997
|
|
GB/T 15121.3-1996
|
Information technology. Computer graphics. Metafile for storage and transferof picture description information. Part 3: Binary encoding
|
GB/T 15121.3-1996
|
|
GB/T 15121.4-1996
|
Information technology. Computer graphics. Metafile for storage and transfer of picture description information. Part 4: Clear text encoding
|
GB/T 15121.4-1996
|
|
GB/T 15121.1-1994
|
Information processing systems. Computer graphics. Metafile for storage and transfer of picture description information. Part 1: Functional specification
|
GB/T 15121.1-1994
|
|
GB/T 15121.2-1994
|
Information processing systems--Computer graphics--Metafile for storage and transfer of picture description information--Part 2: Character encoding
|
GB/T 15121.2-1994
|
|
GB/T 9544-1988
|
Information processing systems. Computer graphics. Graphical kernel system (GKS) functional description
|
GB/T 9544-1988
|
|
GB/T 19713-2025
|
Cybersecurity technology - Public key infrastructure - Online certificate status protocol
|
GB/T 19713-2025
|
|
GB/T 37027-2025
|
Cybersecurity technology - Criteria for determing network attack and network attack incident
|
GB/T 37027-2025
|
|
GB/T 43710-2025
|
Requirements for auditing of scientific data security
|
GB/T 43710-2025
|
|
GB/T 45230-2025
|
Data security technology - General framework for confidential computing
|
GB/T 45230-2025
|
|
GB/T 45240-2025
|
General requirements for device-independent quantum random number generators
|
GB/T 45240-2025
|
|
GB/T 45389-2025
|
Data security technology - Capability requirements for assessment organization of data security
|
GB/T 45389-2025
|
|
GB/T 45392-2025
|
Data security technology - Security requirements for automated decision making based on personal information
|
GB/T 45392-2025
|
|
GB/T 45396-2025
|
Data security technology - Security requirements for government data processing
|
GB/T 45396-2025
|
|
GB/T 45404-2025
|
Data security technology - Requirements for large Internet companies internal personal information protection supervision agency
|
GB/T 45404-2025
|
|
GB/T 45406-2025
|
Security technical requirements for critical network devices - Programmable logic controller(PLC)
|
GB/T 45406-2025
|
|
GB/T 45409-2025
|
Cybersecurity technology - Technical specifications for operation and maintenance security management products
|
GB/T 45409-2025
|
|
GB/T 45574-2025
|
Data security technology - Security requirements for processing of sensitive personal information
|
GB/T 45574-2025
|
|
GB/T 45576-2025
|
Cybersecurity technology - Guidelines for application of cybersecurity insurance
|
GB/T 45576-2025
|
|
GB/T 45577-2025
|
Data security technology - Risk assessment method for data security
|
GB/T 45577-2025
|
|
GB/T 45652-2025
|
Cybersecurity technology - Security specification for generative artificial intelligence pre-training and fine-tuning data
|
GB/T 45652-2025
|
|
GB/T 45654-2025
|
Cybersecurity technology - Basic security requirements for generative artificial intelligence service
|
GB/T 45654-2025
|
|
GB/T 45674-2025
|
Cybersecurity technology - Generative artificial intelligence data annotation security specification
|
GB/T 45674-2025
|
|
GB/T 20988-2025
|
Cybersecurity technology - Disaster recovery specifications for information systems
|
GB/T 20988-2025
|
|
GB/T 22080-2025
|
Cybersecurity technology - Information security management systems - Requirements
|
GB/T 22080-2025
|
|
GB/T 45909-2025
|
Cybersecurity technology - Implementation guideline of digital watermarking technology
|
GB/T 45909-2025
|
|
GB/T 19771-2025
|
Cybersecurity technology - Public key infrastructure - Specification for minimum interoperability for PKI components
|
GB/T 19771-2025
|
|
GB/T 20520-2025
|
Cybersecurity technology - Public key infrastructure - Specification for time stamp
|
GB/T 20520-2025
|
|
GB/T 31722-2025
|
Cybersecurity technology - Guidance on managing information security risks
|
GB/T 31722-2025
|
|
GB/T 45958-2025
|
Cybersecurity technology - Security framework for artificial intelligence computing platform
|
GB/T 45958-2025
|
|
GB/T 46068-2025
|
Data security technology - Security certification requirements for cross-border processing activity of personal information
|
GB/T 46068-2025
|
|
GB/T 46071-2025
|
Data security technology - Guidance on social responsibility of data security and personal information protection
|
GB/T 46071-2025
|
|
GB/T 34942-2025
|
Cybersecurity technology - The assessment method for security capability of cloud computing service
|
GB/T 34942-2025
|
|
GB/T 19714-2025
|
Cybersecurity technology - Public key infrastructure - Certificate management protocol
|
GB/T 19714-2025
|
|
GB/T 45940-2025
|
Cybersecurity technology - Implementation guide of cybersecurity operation and maintenance
|
GB/T 45940-2025
|
|
GB/T 15843.4-2024
|
Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function
|
GB/T 15843.4-2024
|
|
GB/T 17903.1-2024
|
Information technology - Security techniques - Non-repudiation - Part 1: General
|
GB/T 17903.1-2024
|
|
GB/T 17903.3-2024
|
Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques
|
GB/T 17903.3-2024
|
|
GB/T 18336.1-2024
|
Cybersecurity technology - Evaluation criteria for IT security - Part 1: Introduction and general model
|
GB/T 18336.1-2024
|
|
GB/T 18336.2-2024
|
Cybersecurity technology - Evaluation criteria for IT security - Part 2: Security functional components
|
GB/T 18336.2-2024
|
|
GB/T 18336.3-2024
|
Cybersecurity technology - Evaluation criteria for IT security - Part 3: Security assurance components
|
GB/T 18336.3-2024
|
|
GB/T 18336.4-2024
|
Cybersecurity technology - Evaluation criteria for IT security - Part 4: Framework for specification of evaluation methods and activities
|
GB/T 18336.4-2024
|
|
GB/T 18336.5-2024
|
Cybersecurity technology - Evaluation criteria for IT security - Part 5: Pre-defined packages of security requirements
|
GB/T 18336.5-2024
|
|
GB/T 30270-2024
|
Cybersecurity technology - Methodology for IT security evaluation
|
GB/T 30270-2024
|
|
GB/T 31497-2024
|
Information technology - Security techniques - Information security management - Monitoring, measurement, analysis and evaluation
|
GB/T 31497-2024
|
|
GB/T 33563-2024
|
Cybersecurity technology - Security technology requirements for wireless local area network client
|
GB/T 33563-2024
|
|
GB/T 33565-2024
|
Cybersecurity technology - Security technology requirements for wireless local area network access system
|
GB/T 33565-2024
|
|
GB/T 43694-2024
|
Cybersecurity technology - Certificate application integrated service interface specification
|
GB/T 43694-2024
|
|
GB/T 43696-2024
|
Cybersecurity security technology - Zero trust reference architecture
|
GB/T 43696-2024
|
|
GB/T 43697-2024
|
Data security technology - Rules for data classification and grading
|
GB/T 43697-2024
|
|
GB/T 43698-2024
|
Cybersecurity technology - Security requirements for software supply chain
|
GB/T 43698-2024
|
|
GB/T 43739-2024
|
Cybersecurity technology - Audit and management guide for personal information processing normativeness of mobile internet applications in App stores
|
GB/T 43739-2024
|
|
GB/T 43741-2024
|
Cybersecurity technology - Requirements for crowdsourcing security test services
|
GB/T 43741-2024
|
|
GB/T 43779-2024
|
Cybersecurity technology - Technical specification for caller identity authentication using crypto tokens
|
GB/T 43779-2024
|
|
GB/T 43844-2024
|
IPv6 address assignment and coding rules - Interface identifier
|
GB/T 43844-2024
|
|
GB/T 43848-2024
|
Cybersecurity technology - Evaluation method for open source code security of software products
|
GB/T 43848-2024
|
|
GB/T 15843.2-2024
|
Cybersecurity technology - Entity authentication - Part 2: Mechanisms using authenticated encryption
|
GB/T 15843.2-2024
|
|
GB/T 15852.2-2024
|
Cybersecurity technology - Message authentication codes(MACs) - Part 2: Mechanisms using a dedicated hash-function
|
GB/T 15852.2-2024
|
|
GB/T 18238.1-2024
|
Cybersecurity technology - Hash-functions - Part 1: General
|
GB/T 18238.1-2024
|
|
GB/T 18238.2-2024
|
Cybersecurity technology - Hash-functions - Part 2: Hash-functions using a block cipher
|
GB/T 18238.2-2024
|
|
GB/T 18238.3-2024
|
Cybersecurity technology - Hash-functions - Part 3: Dedicated hash-functions
|
GB/T 18238.3-2024
|
|
GB/T 20279-2024
|
Cybersecurity technology - Technical specification for network and terminal separation products
|
GB/T 20279-2024
|
|
GB/T 22081-2024
|
Cybersecurity technology - Information security controls
|
GB/T 22081-2024
|
|
GB/T 29244-2024
|
Cybersecurity technology - Security specification for office devices
|
GB/T 29244-2024
|
|
GB/T 44588-2024
|
Data security technology - Personal information processing rules of internet platforms, products and services
|
GB/T 44588-2024
|
|
GB/T 44602-2024
|
Cybersecurity technology - Cybersecurity technical specification for smart lock products
|
GB/T 44602-2024
|
|
GB/T 30278-2024
|
Cybersecurity technology - Government client computer core configuration specifications
|
GB/T 30278-2024
|
|
GB/T 44886.1-2024
|
Cybersecurity technology - Cybersecurity product interconnectivity - Part 1: Framework
|
GB/T 44886.1-2024
|
|
GB/T 29240-2024
|
Cybersecurity technology - General security technical specification for terminal computer
|
GB/T 29240-2024
|
|
GB/T 31500-2024
|
Cybersecurity technology - Security specification of data recovery service for storage media
|
GB/T 31500-2024
|
|
GB/T 44862-2024
|
Cybersecurity technology - Cyber-resilience evaluation criteria
|
GB/T 44862-2024
|
|
GB/T 15843.3-2023
|
Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques
|
GB/T 15843.3-2023
|
|
GB/T 17902.1-2023
|
Information technology - Security techniques - Digital signatures with appendix - Part 1: General
|
GB/T 17902.1-2023
|
|
GB/T 20274.1-2023
|
Information security technology - Evaluation framework for information systems security assurance - Part 1: Introduction and general model
|
GB/T 20274.1-2023
|
|
GB/T 21053-2023
|
Information security techniques - Public key infrastructure - Security technology requirement for PKI system
|
GB/T 21053-2023
|
|
GB/T 21054-2023
|
Information security techniques - Public key infrastructure - Security testing assessment approaches for PKI system
|
GB/T 21054-2023
|
|
GB/T 32922-2023
|
Information security technology - Baseline and implementation guide of IPSec VPN securing access
|
GB/T 32922-2023
|
|
GB/T 33134-2023
|
Information security technology - Security requirement of public domain name service system
|
GB/T 33134-2023
|
|
GB/T 42446-2023
|
Information security technology - Basic requirements for competence of cybersecurity workforce
|
GB/T 42446-2023
|
|
GB/T 42447-2023
|
Information security technology - Data security guidelines for telecom field
|
GB/T 42447-2023
|
|
GB/T 42453-2023
|
Information security technology - General technical requirements for network security situation awareness
|
GB/T 42453-2023
|
|
GB/T 42460-2023
|
Information security technology - Guide for evaluating the effectiveness of personal information de-identification
|
GB/T 42460-2023
|
|
GB/T 42461-2023
|
Information security technology - Guidelines for cyber security service cost measurement
|
GB/T 42461-2023
|