Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GM/T 0017-2023 English PDF

US$5669.00 · In stock
Delivery: <= 19 days. True-PDF full-copy in English will be manually translated and delivered via email.
GM/T 0017-2023: Smart token cryptography application interface data format specification
Status: Valid

GM/T 0017: Historical versions

Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GM/T 0017-20235669 Add to Cart 19 days Smart token cryptography application interface data format specification Valid
GM/T 0017-2012630 Add to Cart Auto, < 3 mins Smart token cryptography application interface data format specification Obsolete

Similar standards

GB/T 15843.1   GA/T 1389   GM/T 0019   GM/T 0020   GM/T 0018   

Basic data

Standard ID: GM/T 0017-2023 (GM/T0017-2023)
Description (Translated English): Smart token cryptography application interface data format specification
Sector / Industry: Chinese Industry Standard (Recommended)
Classification of Chinese Standard: L80
Word Count Estimation: 230,222
Date of Issue: 2023-12-04
Date of Implementation: 2024-06-01
Issuing agency(ies): State Administration of Cryptography

GM/T 0017-2012: Smart token cryptography application interface data format specification

---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Smart token cryptography application interface data format specification ICS 35.040 L80 Record number. 38315-2013 People's Republic of China Password Industry Standard Smart password key Cryptographic application interface data format specification 2012-11-22 released 2012-11-22 implementation Issued by the National Cryptography Administration

Table of contents

Preface Ⅴ Introduction Ⅵ 1 Scope 1 2 Normative references 1 3 Terms and definitions 1 4 Abbreviations 2 5 mark 3 6 Structural model 3 7 APDU message structure 4 7.1 Overview 4 7.2 Command APDU 5 7.3 Coding Convention of Command Body 5 7.4 Response to APDU 6 8 Coding conventions for command header, data field and response status word 7 8.1 Overview 7 8.2 CLA (category) byte 7 8.3 INS (command) byte 7 8.4 Parameter byte 9 8.5 Data field byte 10 8.6 Status byte 10 9 APDU command 11 9.1 Device management instructions 11 9.1.1 Overview 11 9.1.2 SetLabel (Set Device Label) 12 9.1.3 GetDevInfo (Get Device Information) 13 9.2 Access control instructions 16 9.2.1 Overview 16 9.2.2 DevAuth (device authentication) 16 9.2.3 ChangeDevAuthKey (Modify Device Authentication Key) 17 9.2.4 GetPinInfo (Get PIN Information) 18 9.2.5 ChangePin (Modify PIN) 19 9.2.6 VerifyPin (Verify PIN) 21 9.2.7 UnblockPin (Unlock PIN) 22 9.2.8 ClearSecureState (clear application security state) 23 9.3 Application Management Instructions 24 9.3.1 Overview 24 9.3.2 CreateApplication (Create Application) 24 9.3.3 EnumApplication (enumeration application) 25 9.3.4 DeleteApplication (Delete Application) 26 9.3.5 OpenApplication (Open Application) 27 9.3.6 CloseApplication (close application) 29 9.4 File management instructions 29 9.4.1 Overview 29 9.4.2 CreateFile (Create File) 30 9.4.3 DeleteFile (delete file) 31 9.4.4 EnumFiles (enumeration file) 32 9.4.5 GetFileInfo (Get File Information) 33 9.4.6 ReadFile (Read File) 34 9.4.7 WriteFile 35 9.5 Container Management Instructions 37 9.5.1 Overview 37 9.5.2 CreateContainer (Create Container) 37 9.5.3 OpenContainer (open the container) 38 9.5.4 CloseContainer (close the container) 39 9.5.5 EnumContainer (enumeration container) 40 9.5.6 DeleteContainer (Delete Container) 41 9.5.7 GetContainerInfo (Get Container Information) 42 9.5.8 ImportCertificate (Import Digital Certificate) 43 9.5.9 ExportCertificate (Export Digital Certificate) 44 9.6 Password Service Directive 45 9.6.1 Overview 45 9.6.2 GenRandom (Generate Random Number) 45 9.6.3 GenRSAKeyPair (Generate RSA Signature Key Pair) 46 9.6.4 ImportRSAKeyPair (import RSA encryption key pair) 48 9.6.5 RSASignData (RSA Signature) 49 9.6.6 RSAVerify (RSA verification) 50 9.6.7 RSAExportSessionKey (RSA generated and exported session key) 52 9.6.8 RSAExportSessionKeyEx (RSA Export Session Key) 53 9.6.9 ExtRSAPubKeyOperation (RSA foreign public key operation) 55 9.6.10 GenECCKeyPair (Generate ECC Signature Key Pair) 56 9.6.11 ImportECCKeyPair (import ECC encryption key pair) 57 9.6.12 ECCSignData (ECC Signature) 60 9.6.13 ECCVerify (ECC verification) 61 9.6.14 ECCExportSessionKey (ECC generates and exports session key) 63 9.6.15 ECCExportSessionKeyEx (ECC Export Session Key) 65 9.6.16 ExtECCEncrypt (ECC foreign public key encryption) 66 9.6.17 GenerateAgreementDataWithECC (ECC generates key agreement parameters and outputs) 68 9.6.18 GenerateAgreementDataAndKeyWithECC (ECC generates negotiation data and calculates the session key) 69 9.6.19 GenerateKeyWithECC (ECC calculation session key) 71 9.6.20 ExportPublicKey (Export Public Key) 73 9.6.21 ImportSessionKey (import encrypted session key) 74 9.6.22 EncryptInit (Encryption Initialization) 76 9.6.23 Encrypt (single set of data encryption) 77 9.6.24 EncryptUpdate (multi-group data encryption) 78 9.6.25 EncryptFinal (end encryption) 79 9.6.26 DecryptInit (decryption initialization) 81 9.6.27 Decrypt (single set of data decryption) 82 9.6.28 DecryptUpdate (decrypt multiple groups of data) 83 9.6.29 DecryptFinal (end decryption) 84 9.6.30 DigestInit (Password Hash Initialization) 85 9.6.31 Digest (single set of data password hash) 87 9.6.32 DigestUpdate (multiple sets of data password hash) 88 9.6.33 DigestFinal (end password hash) 89 9.6.34 MacInit (Message Authentication Code Operation Initialization) 90 9.6.35 Mac (single group data message authentication code operation) 91 9.6.36 MacUpdate (multi-group data message authentication code operation) 92 9.6.37 MacFinal (End Message Authentication Code Operation) 93 9.6.38 DestroySessionKey (Destroy Session Key) 94 10 Device Protocol 95 10.1 Overview 95 10.2 Device identification mechanism 96 10.3 CCID Protocol 96 10.4 USBMassStorage protocol extension 96 10.4.1 Terminology 96 10.4.2 Mass storage device (USBMassStorage) 96 10.4.3 APDU command response pair 97 10.4.4 Error code type 99 10.5 HID protocol extension 99 10.5.1 Terminology 99 10.5.2 Introduction to HID Protocol 100 10.5.3 Packet format 100 Appendix A (Normative Appendix) Definition and Description of Device Return Code 104 Appendix B (Normative Appendix) Security Message Calculation Instructions 106 Appendix C (informative appendix) Programming example 108 C.1 Equipment Certification 108 C.2 Modify the device authentication key 110 C.3 Set device label 111 C.4 Add application 112 C.5 Delete application 114 C.6 Modify PIN 115 C.7 Verify PIN 118 C.8 PIN unlock 122 C.9 Create a key container 125 C.10 Delete key container 128 C.11 ECC certificate production process 131 C.12 Use SM2 key pair for digital signature 137 C.13 Use SM2 for digital signature verification 139 C.14 Using SM2 key pairs to exchange session keys 141

Foreword

This standard was drafted in accordance with the rules given in GB/T 1.1-2009. Please note that certain contents of this document may involve patents. The issuing agency of this document is not responsible for identifying these patents. Appendix A and Appendix B of this standard are normative appendices, and Appendix C is an informative appendix. This standard was proposed and managed by the State Cryptography Administration. The main drafting organizations of this standard. Beijing Jiangnan Tianan Technology Co., Ltd., Beijing Watch Intelligent Technology Co., Ltd., Beijing Feitian Credit Branch Technology Co., Ltd., Beijing Tiandirong Technology Co., Ltd., Hengbao Co., Ltd., Beijing Digital Certificate Certification Center Co., Ltd., Beijing Tianwei Chengxin E-commerce Service Co., Ltd., Beijing Guofuan E-commerce Security Certification Co., Ltd. Participated in the formulation of this standard. Beijing Haitai Fangyuan Technology Co., Ltd., Beijing Huada Zhibao Electronic System Co., Ltd., Beijing Daming Five Technology Co., Ltd., China Banknote Credit Card Industry Development Co., Ltd., Beijing Huahong Integrated Circuit Design Co., Ltd., Beijing Xuanji Information Technology Co., Ltd., Beijing Chuangyuan Tiandi Technology Co., Ltd., China Railway Xinan (Beijing) Information Security Technology Co., Ltd., Beijing Tianchengsheng Industry Technology Co., Ltd., Oriental Port Technology Co., Ltd., Geer Century Smart Card Technology Co., Ltd., Beijing Yongxin Shibo Digital TV Technology Co., Ltd., Jida Zhengyuan Information Technology Co., Ltd., Shenzhen Wending Chuang Data Technology Co., Ltd., Wuhan Tianyu Information Industry Co., Ltd. Limited company. The main drafters of this standard. Liu Ping, Wang Yanping, Li Shaoxiong, Liu Bo, Li Qing, Deng Xiaosi, Wang Xuelin, Li Guo, Hu Yanfen, Zhu Pengfei, Zhao Liming, Feng Chengyong, Zhang Haisong, Fu Wei.

Introduction

The GM/T 0016 "Smart Password Key Password Application Interface Specification" issued by the State Cryptography Administration is a domestic smart password at the application layer The use of the key provides a unified technical standard and interface specification, and has achieved good results. In order to better solve this interface specification For product compatibility issues with equipment providers, a unified interface data format is provided at the equipment access layer, and the ``Smart Password Key Password Application It is necessary to use the interface data format specification. This standard is developed on the basis of GM/T 0016 "Intelligent Key Password Application Interface Specification" One step specifies the data access interface of this type of product, from data types, data formats, parameter descriptions and definitions, security requirements, etc. The detailed description can be used to guide the development, use and testing of related products. The cryptographic algorithms involved in this standard are used in accordance with the requirements of the national cryptographic management department. Smart password key Cryptographic application interface data format specification

1 Scope

This standard specifies the data format of the smart cryptographic key application interface based on the PKI cryptosystem, and gives the types of interface-related data. Type, format, parameter definition and description, and safety requirements. This standard applies to the development, use and testing of smart cryptographic key products.

2 Normative references

The following documents are indispensable for the application of this document. For dated reference documents, only the dated version applies to this article Pieces. For undated references, the latest version (including all amendments) applies to this document. GM/T 0005 Randomness Testing Specification GM/T 0006 Code Application Identification Specification GM/T 0009 SM2 cryptographic algorithm usage specification GM/T 0016-2012 Smart Password Key Password Application Interface Specification ISO 7816-4 Identification Cards--Integrated Circuit Cards with Contacts Part 4.Organization, Security and Exchange Orders PKCS

3 Terms and definitions

The following terms and definitions apply to this document. 3.1 Smart password key smarttoken Terminal password products that can complete the password function and secure storage generally use the USB interface. 3.2 Device In this standard, smart password keys are collectively referred to as equipment. 3.3 Command A message sent by the application interface to the device, which initiates an operation or requests a response. 3.4 Response After the device processes the received command message, it returns the message to the application interface. 3.5 Function The processing process realized by one or more commands, the operation result is used to complete all or part of the transaction.
......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GM/T 0017-2023_English be delivered?

Answer: Upon your order, we will start to translate GM/T 0017-2023_English as soon as possible, and keep you informed of the progress. The lead time is typically 14 ~ 19 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GM/T 0017-2023_English with my colleagues?

Answer: Yes. The purchased PDF of GM/T 0017-2023_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.

Question 5: Should I purchase the latest version GM/T 0017-2023?

Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GM/T 0017-2023 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.