GB/T 40653-2021 English PDFUS$1159.00 · In stock
Delivery: <= 7 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 40653-2021: Information security technology - Technical requirements for security processor Status: Valid
Basic dataStandard ID: GB/T 40653-2021 (GB/T40653-2021)Description (Translated English): Information security technology - Technical requirements for security processor Sector / Industry: National Standard (Recommended) Classification of Chinese Standard: L80 Word Count Estimation: 58,568 Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration GB/T 40653-2021: Information security technology - Technical requirements for security processor---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.Information security technology - Technical requirements for security processor ICS 35.030 CCSL80 National Standards of People's Republic of China Information Security Technology Security processor technical requirements Released on 2021-10-11 2022-05-01 implementation State Administration of Market Supervision and Administration Issued by the National Standardization Management Committee Table of contentsForeword Ⅰ 1 Scope 1 2 Normative references 1 3 Terms and definitions 1 4 Abbreviations 2 5 Security processor general structure 2 6 Security purpose 4 7 Safety function requirements 7 8 Security requirements 20 Appendix A (informative) Life cycle stage and working status description 37 Appendix B (Informative) Definition of Assets and Security Issues 45 Appendix C (normative) Component dependencies 51ForewordThis document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for Standardization Work Part 1.Structure and Drafting Rules of Standardization Documents" Drafting. Please note that some of the contents of this document may involve patents. The issuing agency of this document is not responsible for identifying patents. This document was proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). Drafting organizations of this document. Beijing Duosi Science and Technology Industrial Park Co., Ltd., China Information Security Evaluation Center, State Cryptography Administration Password Testing Center, North China Electric Power University, the Third Research Institute of the Ministry of Public Security, Wangshen Information Technology (Beijing) Co., Ltd., China Electronic Information Industrial Development Research Institute, Hangzhou Hualan Microelectronics Co., Ltd., Hangzhou Anheng Information Technology Co., Ltd., Chinese People's Liberation Army Strategically support the Army Information Engineering University, Zhuhai Fudan Innovation Research Institute, Beijing Duosi Security Chip Technology Co., Ltd. The main drafters of this document. Liu Dali, Li Dawei, Luo Peng, Zhang Chongbin, Wangzhoufu, Gao Jinping, Shi Hongsong, Yang Yongsheng, Cao Chunchun, Xia Hong, Wang Chuang, Wei Anlei, Yang Yuanyuan, Liu Huipeng, Li Hongyang, Wei Xiaowei, Wang Hui, Song Ke, Wang Junyu, Gao Yanfang, Zhou Bin. Information Security Technology Security processor technical requirements1 ScopeThis document specifies the safety function requirements and safety assurance requirements of the safety processor. This document applies to the design, production and application of safety processors.2 Normative referencesThe contents of the following documents constitute indispensable clauses in this document through normative references in the text. Among them, dated quotations Only the version corresponding to the date is applicable to this document. For undated reference documents, the latest version (including all amendments) is applicable to This document. GB/T 18336 (all parts) Information Technology Security Technology Information Technology Security Evaluation Criteria GB/T 25069 Information Security Technical Terms GB/T 32915-2016 Information security technology binary sequence randomness detection method3 Terms and definitionsThe following terms and definitions defined in GB/T 25069 apply to this document. 3.1 Securityprocessor Composed of firmware and hardware entities, it has physical protection, logical protection, and application protection capabilities, and can achieve a certain security strength and safety, etc. Level of processor. Note. The security processor implementation technology includes cryptographic technology, physical protection technology, data encoding technology, reconfigurable logic technology, etc. 3.2 Physical protection Adopt the design of attack protection, attack detection methods, use detection and processing functions to monitor the working environment of the processor, and support abnormalities Behavior response audit processing, security capabilities to prevent physical threats. Note. Attack protection includes security protection design of masks, packaging, physical interfaces, etc.; attack detection includes optical, electromagnetic, logical open circuit, short circuit, bypass detection, etc.; engineering The operating environment includes temperature, frequency, voltage testing, etc.; response audit processing includes measures such as notification, marking, response processing, and audit processing. 3.3 Application protection Link physical protection functions, with the ability to protect programs and data, run state detection and monitoring capabilities, resource scheduling and configuration control The ability to control security, secure communication, and support abnormal behavior response audit processing, and prevent application threats. Note. Protection capabilities include the use of homomorphic computing, cryptographic technology applications to program and data processing capabilities, resource scheduling and configuration control including secure storage and control Measures such as management and security configuration, and secure communication includes measures such as encrypted transmission, the use of trusted root transmission, and identity authentication. 3.4 Logic protection According to the security functions of physical protection and application protection, adjust the security policy through resource configuration, operation configuration, and running state control. To make the logical structure and control have stronger security strength and flexibility against unknown attacks, and the security ability to prevent logical threats. 3.5 Runningstate Safety processor operating status. ......Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 40653-2021_English be delivered?Answer: Upon your order, we will start to translate GB/T 40653-2021_English as soon as possible, and keep you informed of the progress. The lead time is typically 4 ~ 7 working days. The lengthier the document the longer the lead time.Question 2: Can I share the purchased PDF of GB/T 40653-2021_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 40653-2021_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. |