GB/T 40650-2021 English PDFUS$249.00 · In stock
Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 40650-2021: Information security technology - Trusted computing specification - Trusted platform control module Status: Valid
Basic dataStandard ID: GB/T 40650-2021 (GB/T40650-2021)Description (Translated English): Information security technology - Trusted computing specification - Trusted platform control module Sector / Industry: National Standard (Recommended) Classification of Chinese Standard: L80 Word Count Estimation: 13,148 Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration GB/T 40650-2021: Information security technology - Trusted computing specification - Trusted platform control module---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order. Information security technology - Trusted computing specification - Trusted platform control module ICS 35.030 CCSL80 National Standards of People's Republic of China Information Security Technology Trusted Computing Specification Trusted Platform Control Module Released on 2021-10-11 2022-05-01 implementation State Administration for Market Regulation Issued by the National Standardization Management Committee Table of contentsForeword Ⅰ 1 Scope 1 2 Normative references 1 3 Terms and definitions 1 4 Abbreviations 2 5 Overview 2 5.1 Trusted platform control module positioning 2 5.2 Interaction between Trusted Platform Control Module and Peripheral 3 5.3 Other 3 6 Functional composition of trusted platform control module 4 6.1 Functional composition framework 4 6.2 Hardware layer 4 6.3 Basic software layer 4 6.4 Functional component layer 4 6.5 Interconnection interface 5 7 Interface of Trusted Platform Control Module 5 7.1 Computing component interface 5 7.2 Trusted Software Base Interface 5 7.3 Management interface 5 7.4 Trusted cryptographic module interface 6 8 Security 6 8.1 Identification 6 8.2 Resource Access Control 6 8.3 Audit 6 8.4 Storage space safety requirements 7 8.5 Data protection 7 8.6 Physical protection 7 9 Operation and maintenance 7 9.1 Self-check 7 9.2 Status Maintenance 7 10 Confirmation method 8 10.1 Trusted platform control module of trusted computing node 8 10.2 Functional composition of trusted platform control module 8 10.3 Interface of Trusted Platform Control Module 8 10.4 Safety protection 9 10.5 Operation and maintenance 10ForewordThis document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for Standardization Work Part 1.Structure and Drafting Rules of Standardization Documents" Drafting. Please note that some of the contents of this document may involve patents. The issuing agency of this document is not responsible for identifying patents. This document was proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). Drafting organizations of this document. Huada Semiconductor Co., Ltd., Beijing University of Technology, Beijing Trustworthy Huatai Information Technology Co., Ltd., Global Energy Internet Research Institute Co., Ltd., Shanghai Suanshi Technology Co., Ltd., Tongji University, Alibaba (China) Co., Ltd., Inspur (Beijing) Electronics Information Industry Co., Ltd., China Shipbuilding Industry Corporation 709th Research Institute, Wuhan University, Shanghai Zhaoxin Integrated Circuit Co., Ltd., Guangdong Jiuzhang Information Technology Co., Ltd., Shanghai Industrial Control Safety Innovation Technology Co., Ltd., Lanma Zhuoxin Technology (Shanghai) Co., Ltd., Zhong'an Technology Group Co., Ltd., Beijing New Cloud Oriental System Technology Co., Ltd. The main drafters of this document. Huang Jianhui, Zhang Jianbiao, Wang Guan, Hu Jun, Wang Yubo, Gong Bei, Ning Zhenhu, Sun Yu, Gao Kunlun, Zhao Baohua, Jiang Changjun, Yu Jian, Hong Yu, Wang Liang, Yang Huan, Fu Yingfang, Xiao Peng, Xu Mingdi, Wu Baoxi, Su Zhenyu, Wang Juan, Xue Gangru, Ling Jinhong, Liu Hong, Cheng Jun, Su Qiuyu, Liu Jianli, Xu Wanshan, Wang Xiao, Yang Yongdang. Information Security Technology Trusted Computing Specification Trusted Platform Control Module1 ScopeThis document describes the position and role of the trusted platform control module in the trusted computing node, and specifies the functions of the trusted platform control module. Capability, functional interface, safety protection, operation and maintenance requirements and verification methods. This document is applicable to the design, production, operation, maintenance and evaluation of the trusted platform control module.2 Normative referencesThe content of the following documents constitutes an indispensable clause of this document through normative references in the text. Among them, dated quotations Only the version corresponding to the date is applicable to this document; for undated reference documents, the latest version (including all amendments) is applicable to This document. GB/T 29829 Information Security Technology Trusted Computing Cryptographic Support Platform Function and Interface Specification GB/T 37935 Information Security Technology Trusted Computing Specification Trusted Software Base GM/T 0008 Security Chip Password Detection Guidelines3 Terms and definitionsThe following terms and definitions apply to this document. 3.1 Trustedcryptographymodule A module that has functions such as cryptographic operations required by trusted computing and can provide protected storage space. 3.2 Trustedcomputingnode A computing node that is composed of trusted protection components and computing components, and has the function of computing and protecting parallel operation. 3.3 Trusted Platform Control Module trustedplatformcontrolmodule The protection component components integrated in the trusted computing node are composed of hardware, software and firmware, and the hardware, software and firmware of the computing component Parallel connection is a basic core module used to establish and guarantee the source of trust. It provides active measurement, active control, and active control for trusted computing nodes. Functions such as trusted verification, encryption protection, trusted report, and password invocation. 3.4 Valid state enabledstate The trusted platform control module is in a working state that can receive and execute all instructions. 3.5 Disable state The trusted platform control module is in a special working state where it can only execute query and enable commands. 3.6 Active self-checking The trusted platform controls the detection operation of the module's internal specified content after the module is powered on. ......Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 40650-2021_English be delivered?Answer: Upon your order, we will start to translate GB/T 40650-2021_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time.Question 2: Can I share the purchased PDF of GB/T 40650-2021_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 40650-2021_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. |