|
US$909.00 · In stock Delivery: <= 7 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 25065-2010: Information security technology -- Public key infrastructure -- Security requirements for signature creation applications Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 25065-2010 | English | 909 |
Add to Cart
|
7 days [Need to translate]
|
Information security technology -- Public key infrastructure -- Security requirements for signature creation applications
| Valid |
GB/T 25065-2010
|
PDF similar to GB/T 25065-2010
Basic data | Standard ID | GB/T 25065-2010 (GB/T25065-2010) | | Description (Translated English) | Information security technology -- Public key infrastructure -- Security requirements for signature creation applications | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L80 | | Classification of International Standard | 35.240.40 | | Word Count Estimation | 41,498 | | Date of Issue | 2010-09-02 | | Date of Implementation | 2011-02-01 | | Quoted Standard | GB/T 25064-2010 | | Regulation (derived from) | Announcement of Newly Approved National Standards No. 4 of 2010 (total 159) | | Issuing agency(ies) | General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China | | Summary | This standard specifies the produce reliable electronic signature signature generation applications (SCA) safety requirements, including: defining a model for signature generation and signature generation environment functionality of the application model, provision applies to the functional model of all functional blocks general requirements, provision signature generation application security requirements of each functional module, in addition to SSCD. This standard applies to all used to generate a reliable electronic signature signature generation applications. |
GB/T 25065-2010: Information security technology -- Public key infrastructure -- Security requirements for signature creation applications ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology. Public key infrastructure. Security requirements for signature creation applications
ICS 35.240.40
L80
National Standards of People's Republic of China
Information security technology - Public key infrastructure
Safety requirements for signature generation application
Issued on. 2010-09-02
2011-02-01 implementation
Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China
Standardization Administration of China released
Table of Contents
Introduction Ⅴ
1 Scope 1
2 Normative references 1
3 Terms and definitions
4 Abbreviations 3
5 signature generation function model 3
5.1 signature generation target 3
5.2 Functional Model 3
5.3 signature generation application 5
5.4 Secure Signature Creation Device 6
5.5 signature generation application instance 7
5.6 control and signature generation system has 7
6 7 signed data object information model
6.1 signer file 8
6.2 Signature Properties 8
6.3 9 data to be signed
6.4 9 formatted data to be signed
6.5 9 represents data to be signed
6.6 9 reliable electronic signature
6.7 Signed Data Object 9
6.8 signer identification data 9
7 SCA's overall security requirements 10
7.1 Basic Requirements 10
10 7.2 Trusted Path
7.3 Requirements distributed signature generation application 11
Requirements 7.4 pairs untrusted processes and communications ports 11
7.5 signature signature verification data objects afterwards 11
7.6 approach to security check data requirements 11
8 SD represents assembly 12
8.1 Function 12
12 8.2 Classification
8.3 the data type of content 12
8.4 SD unambiguous requirements 13
8.5 pairs of the display is not sensitive to security requirements SD 14
8.6 pairs of hidden text and activity code of claim 14
9 Signature Properties display assembly 14
10 signatures of people interacting components 15
10.1 UI senior principle 15
10.2 15 signatures calling
10.3 Signature process timeout rest 16
10.4 signer controls 16
10.5 signer using the feature to get 16
10.6 User Interface 16
11 signer identification assembly 17
11.1 general requirements 17
Signer identification data obtained 11.2 17
11.3 based on knowledge of the signer identification 17
Signer 11.4 biometric-based identification 17
Error handling 11.5 pairs signer authentication data 18
11.6 signer authentication data changes and reset the counter 18
11.7 signer authentication data the user interface 18
Safety 11.8 signer identification component requirements 18
12 DTBS format assembly 20
Function 12.1 DTBS format components 20
12.2 pairs of safety DTBS format assembly requirements 20
13 Data hash/hash assembly 20
13.1 Data hash/hash function component 20
13.2 DTBSR output resulting assembly 20
13.3 electronic signature input format 21
13.4 pairs of data hash/hash safety component requirements 21
14 SSCD/SCA communication component 22
14.1 interaction sequence 22
14.2 Establish a physical communication link 23
Read token information 23 14.3 SSCD
14.4 on a multi-application platform selection 24 SSCD function
Get 24 14.5 Certificate
Select the electronic signature creation data 14.6 24
14.7 signer authentication execution 25
14.8 Calculation of digital signature 25
Signature record 14.9 log 25
14.10 pairs security SSCD/SCA communication component of claim 25
15 SSCD/SCA component identification 25
Identification and 15.1 SCA 25 SSCD between
15.2 pairs of safety SSCD/SCA component identification requirements 26
16 SD synthesis module 26
17 SDO synthesis module 26
18 External input/output interface 27
27 18.1 SCA risk faced
27 18.2 Import Certificate
Import 18.3 SD and signature attributes 27
18.4 SCA component downloads 27
18.5 pairs of input control security requirements 27
Appendix A (informative) General guidance signature data object 28
Annex B (informative) user interface guidelines 30
Annex C (informative) signature log assembly (SLC) 35
References 36
Foreword
This standard cryptographic algorithms involving relevant content, according to the national laws and regulations implemented.
RSA and SHA-1 cryptographic algorithm in this standard references for example note shall adopt State Password Administration Institution specific use
Corresponding algorithm approved.
The standard reference EESSI standards "CWA14170- signature generation security requirements of the application."
This standard Annex A, Annex B, Annex C is informative appendices.
This standard by the National Safety Standardization Technical Committee (SAC/TC260) and focal points.
This standard was drafted. Beijing VeriSign E-Commerce Service Co., Ltd., China Electronics Standardization Institute, Beijing Posts and Telecommunications
the University.
The main drafters of this standard. Liu Hailong, Novelty Retrieval Song Meina, Hubei Red Sea, Wang Yanming, Zhang Haisong, Yang Zhen, Xu Lei, Shao Zhe.
Information security technology - Public key infrastructure
Safety requirements for signature generation application
1 Scope
This standard specifies produce reliable electronic signature signature generation application (SCA) safety requirements, including. defining a signature
Generation modeling environment models and signature generation applications; functional model applies to the general requirements of all the features of the module; Regulation
Given signature generation application security requirements of each functional module, in addition to SSCD.
The standards apply to all signature generation application for generating reliable electronic signatures.
2 Normative references
The following documents contain provisions which, through reference in this standard and become the standard terms. For dated references, subsequent
Amendments (not including errata content) or revisions do not apply to this standard, however, encourage the parties to the agreement are based on research
Whether the latest versions of these documents. For undated reference documents, the latest versions apply to this standard.
GB/T 25064-2010 Information security technology - Public key infrastructure Electronic Signature Format Specification
3 Terms and Definitions
The following terms and definitions apply to this standard.
3.1
Reliable electronic signature reliableelectronicsignature
Electronic signatures can meet the following criteria. electronic signature creation data used for electronic signature, electronic signature belonging to one exclusive; when signing electricity
Sub signature creation data is controlled only by the electronic signatory; any changes after the signing of the electronic signature can be found; in the data message after signing
Any changes to the form and content can be found.
3.2
Certificate identifier certificateidentifier
A clear identifier certificate.
3.3
Electronic certification service provider certification-service-provider
An entity or a legal or natural person, a certificate or provide other services related to electronic signatures.
3.4
Encryption device cryptographictoken
Personal security device capable of performing cryptographic operations. The signature generation device that is an encryption device.
3.5
Data to be signed datatobesigned
The complete electronic data to be signed.
3.6
Formatted data to be signed datatobesignedformatted
DTBS has been formatted components, and in accordance with the type of signer SDO asked to select the correct order.
3.7
DTBS represents DTBS-representation
By the signature generation application sent to the signature generation device, you need the data to be signed.
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 25065-2010_English be delivered?Answer: Upon your order, we will start to translate GB/T 25065-2010_English as soon as possible, and keep you informed of the progress. The lead time is typically 4 ~ 7 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 25065-2010_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 25065-2010_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|