GB/T 36631-2018 English PDFUS$199.00 ยท In stock
Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 36631-2018: Information security technology -- Time stamp policy and time stamp practice rules Status: Valid
Basic dataStandard ID: GB/T 36631-2018 (GB/T36631-2018)Description (Translated English): Information security technology -- Time stamp policy and time stamp practice rules Sector / Industry: National Standard (Recommended) Classification of Chinese Standard: L80 Classification of International Standard: 35.040 Word Count Estimation: 10,143 Date of Issue: 2018-09-17 Date of Implementation: 2019-04-01 Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration GB/T 36631-2018: Information security technology -- Time stamp policy and time stamp practice rules---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order. (Information Security Technology Time Stamp Policy and Time Stamp Business Operation Rules) ICS 35.040 L80 National Standards of People's Republic of China Information security technology Timestamp policy and timestamp business operation rules Published on.2018-09-17 Implementation of.2019-04-01 State market supervision and administration China National Standardization Administration issued ContentForeword I Introduction II 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 2 5 timestamp strategy 2 5.1 Overview 2 5.2 Timestamp Policy ID 2 5.3 Application Entity 3 5.4 Applicability 3 5.5 Compliance 3 6 timestamp business operation rules 3 6.1 Business entity 3 6.2 Policy Management 3 6.3 Time Stamp Management 3 6.4 Time Synchronization Management 4 6.5 Key Information 4 6.6 Organization Certificate Generation Method 4 6.7 Backup Mechanism 4 6.8 Business Continuity 4 6.9 Operation Management 4 7 Responsibilities and obligations 4 7.1 Responsibility 4 7.2 Obligation 5 Reference 6ForewordThis standard was drafted in accordance with the rules given in GB/T 1.1-2009. Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents. This standard is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This standard was drafted. China Electronics Technology Standardization Research Institute, China Information Security Research Institute Co., Ltd., Chinese Academy of Sciences Software Research Research Institute, Chongqing University of Posts and Telecommunications, National Time Service Center of Chinese Academy of Sciences, Beijing Digital Certification Co., Ltd., Beijing United Trust Technology Service Limited company, Beijing University of Science and Technology, East China Normal University, National Information Security Engineering Technology Research Center, Changchun Jida Zhengyuan Information Technology Co., Ltd. Company, Beijing Tianwei Chengxin E-Commerce Service Co., Ltd., Beijing Ruian Technology Co., Ltd., Beijing University of Aeronautics and Astronautics, Xi'an Electronics Technical University, Henan University of Science and Technology, Communication University of China, China Ping An Insurance (Group) Co., Ltd., Beijing University of Technology, Beijing Post and Telecommunications University Xue, Beijing Zhongdian Puhua Information Technology Co., Ltd., Anhui Science and Technology College. The main drafters of this standard. Wang Huili, Yang Chen, Zhang Liwu, Huang Yonghong, Fan Kefeng, Guo Wei, Zhan Banghua, Zhang Changli, Ning Huansheng, Liu Hong, He Daojing, Yuan Feng, Zhao Lili, Ma Wenping, Yan Qingyi, Chen Xiaofeng, Yang Li, Wu Qianhong, Xu Dongyang, Li Lin, Qi Chunfei, Yang Zhen, Cao Hao, Ma Zhanyu, Cao Zhanfeng, Wan Yue, Mao Jian, Jiang Zhengtao, Zhang Zhiyong, Cai Wei.IntroductionWith the development of information technology, more and more traditional applications have been replaced by network applications, such as e-commerce, digital publishing and other network applications. The traditional method of recording time has not been used in the Internet environment to prove whether time has occurred at a certain moment, when it is triggered to a trusted third party. The need for a poke service. To this end, a number of domestic certification bodies and professional companies have successively launched time-related business services for electronic Forensic, copyright protection, e-commerce and other services provide authoritative, reliable, and fair third-party time stamp services. In.2003, "Electronics The issuance of the Signature Law provides legal protection for the further development of time-stamped business services. To standardize the development of timestamp services, this standard is for third-party timestamp service organizations, in timestamp policies, timestamp business operation rules. It should be standardized such as the timestamp identifier, timestamp management, and the responsibility and obligation of the timestamp associated party. This standard is in the process of formulation In reference to the relevant norms at home and abroad, combined with the characteristics of China's time stamp service and application, it has been adjusted and expanded. Information security technology Timestamp policy and timestamp business operation rules1 ScopeThis standard specifies time stamping strategies, time stamping business operating rules, and responsibilities and obligations. This standard applies to timestamp agencies to prepare timestamp strategies and timestamp business operation rules and other activities.2 Normative referencesThe following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article. Pieces. For undated references, the latest edition (including all amendments) applies to this document. GB/T 16262.1-2006 Information technology abstract grammar notation - (ASN.1) Part 1. Basic notation specification GB/T 20520-2006 Information Security Technology Public Key Infrastructure Time Stamp Specification3 Terms and definitionsThe following terms and definitions as defined in GB/T 20520-2006 apply to this document. For ease of use, the following is repeated Some terms and definitions in GB/T 20520-2006. 3.1 Timestamp policy timestamppolicy A set of specified rule sets that indicate the timestamp's suitability for a particular group and/or application type with the same security requirements. 3.2 Timestamp business operation rule timestamppractice The timestamp mechanism is used by subscribers and relying parties in the process of issuing, managing, deleting and destroying timestamps and TSU key management. Business practice. 3.3 Relying party relyingparty Timestamp receiver. 3.4 Subscriber subscriber An entity that requires a timestamp service by a timestamp mechanism. 3.5 Timestamp mechanism timestampauthority The authority used to generate and manage timestamps. [GB/T 20520-2006, definition 3.3] 3.6 Timestamp service timestampservice A timestamp service provided by a timestamp organization to a subscriber. Note. The file is timed by the subscriber and the time stamp authority issues a time stamp for this file. ...... |