Path:
Home >
GB/T >
Page714 > GB/T 46354-2025
Price & Delivery
US$439.00 · In stock · Download in 9 secondsGB/T 46354-2025: Application specification for resource sharing of data account
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See
step-by-step procedureStatus: Valid
| Std ID | Version | USD | Buy | Deliver [PDF] in | Title (Description) |
| GB/T 46354-2025 | English | 439 |
Add to Cart
|
4 days [Need to translate]
|
Application specification for resource sharing of data account
|
Click to Preview a similar PDF
Basic data
| Standard ID | GB/T 46354-2025 (GB/T46354-2025) |
| Description (Translated English) | Application specification for resource sharing of data account |
| Sector / Industry | National Standard (Recommended) |
| Classification of Chinese Standard | L78 |
| Classification of International Standard | 35.240.01 |
| Word Count Estimation | 22,237 |
| Date of Issue | 2025-10-05 |
| Date of Implementation | 2026-02-01 |
| Issuing agency(ies) | State Administration for Market Regulation and Standardization Administration of China |
GB/T 46354-2025: Application specification for resource sharing of data account
---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35.240.01
CCSL78
National Standards of the People's Republic of China
Data Account Resource Sharing Application Specification
Published on 2025-10-05
Implemented on February 1, 2026
State Administration for Market Regulation
The State Administration for Standardization issued a statement.
Table of contents
Preface III
1.Scope 1
2 Normative References 1
3.Terms and Definitions 1
4.Data Account Resource Application Framework 2
5.Business activities and requirements of data account stakeholders 4
6 Key Business Processes Throughout the Data Account Lifecycle 9
7 Safety Requirements 12
8.Verification Method 12
Appendix A (Informative) Scenario Case 14
References 16
Foreword
This document complies with the provisions of GB/T 1.1-2020 "Standardization Work Guidelines Part 1.Structure and Drafting Rules of Standardization Documents".
Drafting.
Please note that some content in this document may involve patents. The issuing organization of this document assumes no responsibility for identifying patents.
This document was proposed and is under the jurisdiction of the National Electronic Business Standardization Technical Committee (SAC/TC83).
This document was drafted by. Shenzhen Longhua District Government Service and Data Management Bureau, Shenzhen Institute of Standards and Technology, and China Institute of Standardization.
The hospital, Inspur Cloud Information Technology Co., Ltd., Digital Zhejiang Technology Operation Co., Ltd., Shenzhen Mora Technology Co., Ltd., Shenzhen Medical Security Bureau
Bureau, Huawei Technologies Co., Ltd., Shenzhen Anzheng Enterprise Compliance Management (Group) Co., Ltd., Shenzhen Julong Smart City Research Institute, Shenzhen
Huaao Data Technology Co., Ltd., Beijing Zhongke New Urbanization Research Institute, Shenzhen Data Exchange Co., Ltd., and Data Governance Cloud (Beijing) Technology Co., Ltd.
Limited Liability Company, Ping An Technology (Shenzhen) Co., Ltd., Tencent Cloud Computing (Beijing) Co., Ltd., Shenzhen Youqian Information Technology Co., Ltd.
Suzhou Langjietong Intelligent Technology Co., Ltd., Shenzhen Teslian Intelligent Technology Co., Ltd., Guangdong Wandu Technology Group Co., Ltd., Peking University
Shenzhen Smart City Technology Development Group Co., Ltd., Harbin Institute of Technology (Shenzhen), Linyi Public Security Innovation and Development Research Institute, and Hebei Province
Southern Province Talent Digital Technology Co., Ltd., Shanghai Chengdian Fuzhi Technology Co., Ltd., Beijing Computer Society, Beijing University of Science and Technology, Sunwoda
Electronic Co., Ltd., Shenzhen Sanxi Software Technology Co., Ltd., Shenzhen Weidu Data Technology Co., Ltd., Shenzhen Xingke Huachuang
Information Technology Co., Ltd., Hangzhou Weican Technology Co., Ltd., and Guangdong Mingtai Information Technology Co., Ltd.
The main drafters of this document are. Chen Jianmin, Gao Jie, Yang Ge, Zhang Jianfang, Kang Liu, Zheng Jiajia, Zhou Yuanhuan, Liu Guoguang, Du Jia, Zhu Wei, and Chen Pengyu.
Wang Yiqun, Li Yuanhong, Jiang Xin, Cui Hao, Xu Haipeng, Lü Lingguang, He Xuheng, Xiong Gaizhi, Sun Ke, Cai Chunjiu, Wang Teng, Chen Junliang, Sun Ting, Hu Xin
Duan Huhu, Zhou Rui, Zhang Xujie, Li Li, Zeng Xinke, Yu Xiangna, Cheng Jihua, Liao Chunguang, Du Lin, Jia Shiyang, Le Yichang, Wang Gang, Wu Ke, Hu Ying
Wang Zhaoguo, Yang Zaiwen, Huang Ningbo, Weng Zhiyong, Deng Jianhua, Sun Xiaohe, Wang Zhijian, Qi Ruishuang, Deng Yao, Ji Peiduan, Song Simiao, Deng Yongchun, Liu Xu.
Data Account Resource Sharing Application Specification
1 Scope
This document defines the data account resource application framework, the business activities and requirements of data account stakeholders, and the key aspects of the entire data account lifecycle.
Business processes, security requirements, and verification methods.
This document applies to the construction and management of data account resources for organizations and individuals, as well as in scenarios such as government services and public services.
Applications of this technology. Other types of data accounts can refer to this for further information.
2 Normative references
The contents of the following documents, through normative references within the text, constitute essential provisions of this document. Dated citations are not included.
For references to documents, only the version corresponding to that date applies to this document; for undated references, the latest version (including all amendments) applies.
This document.
GB/T 17628 Information Technology Open EDI Reference Model
GB/T 22081 Network Security Technology - Information Security Control
GB/T 22239 Information Security Technology - Basic Requirements for Network Security Level Protection
GB/T 25058 Information Security Technology - Implementation Guidelines for Cybersecurity Level Protection
GB/T 25070 Information Security Technology - Technical Requirements for Security Design of Network Security Level Protection
GB 32100 Coding Rules for Unified Social Credit Code of Legal Persons and Other Organizations
GB/T 32914 Information Security Technology - Requirements for Network Security Service Capabilities
GB/T 35273 Information Security Technology - Personal Information Security Specification
GB/T 35274 Data Security Technology - Security Capability Requirements for Big Data Services
GB/T 35295 Terminology for Big Data in Information Technology
GB/T 35770 Compliance Management System Requirements and Usage Guidelines
GB/T 37973 Information Security Technology - Big Data Security Management Guidelines
GB/T 39477 Information Security Technology - Technical Requirements for Data Security in Government Information Sharing
GB/T 42571 Information Security Technology - Security Specification for Blockchain Information Services
GB/T 43580 General Service Guidelines for Evidence Preservation Using Blockchain and Distributed Ledger Technologies
GB/T 43697 Data Security Technology - Data Classification and Grading Rules
SF/ZJD0400001 General Implementation Specifications for Forensic Expertise in Electronic Data
3 Terms and Definitions
The terms and definitions defined in GB/T 17628, GB 32100, GB/T 35295, and GB/T 43580, as well as the following terms and definitions, apply to this document.
3.1
personal
A natural person who is recognized by law, has legitimate rights and responsibilities, is able to promise, assume and fulfill the obligations that arise, and is responsible for his or her actions.
Note. Individuals include all types of natural persons, whether within or outside China, of Chinese nationality or foreign nationality, who need to apply for or enjoy Chinese government or public services.
...