GB/T 36633-2018 English PDFUS$519.00 ยท In stock
Delivery: <= 5 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 36633-2018: Information security technology -- Technical guide for identity authentication over network Status: Valid
Basic dataStandard ID: GB/T 36633-2018 (GB/T36633-2018)Description (Translated English): Information security technology -- Technical guide for identity authentication over network Sector / Industry: National Standard (Recommended) Classification of Chinese Standard: L80 Classification of International Standard: 35.040 Word Count Estimation: 26,20 Date of Issue: 2018-09-17 Date of Implementation: 2019-04-01 Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration GB/T 36633-2018: Information security technology -- Technical guide for identity authentication over network---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order. Information security technology - Technical guide for identity authentication over network ICS 35.040 L80 National Standards of People's Republic of China Information security technology Network User Identity Identification Technical Guide Published on.2018-09-17 Implementation of.2019-04-01 State market supervision and administration China National Standardization Administration issued ContentForeword III 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 2 5 Overview 2 5.1 Network User Identity Identification Process 2 5.2 Authentication Protocol 4 5.3 Credentials 4 5.4 Verifier 4 5.5 relying party 5 5.6 Password Support 5 6 User registration and certificate issuance process 5 6.1 Registering and Distributing Threats 5 6.2 Coping strategies for registering and distributing threats 6 7 Identification information submission and verification process 7 7.1 Submitting and verifying threats 7 7.2 Coping strategies for submitting and verifying threats 8 8 assertion process 9 8.1 Assertion threat 9 8.2 Strategies for asserting threats 10 9 Document 11 9.1 Type of Document 11 9.2 Credential Threat 12 9.3 Coping strategies for voucher threats 13 10 Certificate Management 14 10.1 Voucher Management Activities 14 10.2 Credential Management Threats 15 10.3 Coping Strategies for Credential Management Threats 15 Appendix A (informative appendix) Identification process of three identification models 17 Appendix B (informative) Basic Assertion Model 19ForewordThis standard was drafted in accordance with the rules given in GB/T 1.1-2009. Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents. This standard is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This standard was drafted. The Third Institute of the Ministry of Public Security, China Electronics Technology Standardization Institute, Xi'an Xidian Jietong Wireless Network Communication Unit Co., Ltd., Beijing University of Technology, Wuhan University. The main drafters of this standard. Gu Jian, Zhang Xiaoxiao, Yang Yuanyuan, Chen Yu, Fan Kefeng, Gu Yu, Yu You, Shen Liang, Wang Yingying, Shen Qingyi, Xu Dongyang, Du Zhiqiang, Li Qin, Yang Zhen, Wang Lina. Information security technology Network User Identity Identification Technical Guide1 ScopeThis standard gives the main process of user identity identification in the network environment and the threat of common authentication technology, and stipulates the defense against The method of threatening. This standard applies to the design, development and testing of user identity authentication systems in a network environment.2 Normative referencesThe following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article. Pieces. For undated references, the latest edition (including all amendments) applies to this document. GB/T 15843.1 Information technology security technology entity identification Part 1. General GB/T 15843.2 Information technology security technology entity identification Part 2. Mechanisms using symmetric cryptographic algorithms GB/T 15843.3 Information technology security technology entity identification Part 3. Mechanisms using digital signature technology GB/T 15843.4 Information technology security technology entity identification Part 4. Mechanisms using cryptographic check function GB/T 15843.5 Information technology security technology entity identification Part 5. Mechanisms using zero-knowledge technology GB/T 25069 Information Security Technical Terminology GB/T 28455 Information Security Technology Introduces Entity Authentication and Access Architecture Specification for Trusted Third Parties3 Terms and definitionsThe following terms and definitions as defined in GB/T 25069 apply to this document. 3.1 Claiming party For identification, it is itself an ontology or an individual representing the ontology. Note. The claimant has various functions that represent the ontology for authentication exchange. 3.2 Applicant applicant An individual requesting the assignment of a registration item and its label. 3.3 Verifier verifier An institution or organization that verifies the legality of a party. 3.4 Relying party relyingparty An organization or organization that relies on the identity authentication result to determine whether to establish a trust relationship with the claimant. 3.5 Credential credential personal I.D. ......Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 36633-2018_English be delivered?Answer: Upon your order, we will start to translate GB/T 36633-2018_English as soon as possible, and keep you informed of the progress. The lead time is typically 3 ~ 5 working days. The lengthier the document the longer the lead time.Question 2: Can I share the purchased PDF of GB/T 36633-2018_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 36633-2018_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. |