HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (19 Oct 2025)

GB/T 25065-2010 English PDF

US$909.00 · In stock
Delivery: <= 7 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 25065-2010: Information security technology -- Public key infrastructure -- Security requirements for signature creation applications
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 25065-2010English909 Add to Cart 7 days [Need to translate] Information security technology -- Public key infrastructure -- Security requirements for signature creation applications Valid GB/T 25065-2010

PDF similar to GB/T 25065-2010


Standard similar to GB/T 25065-2010

GB/T 25068.1   GB/T 25070   GB/T 25064   GB/T 25068.4   GB/T 25069   GB/T 25068.3   

Basic data

Standard ID GB/T 25065-2010 (GB/T25065-2010)
Description (Translated English) Information security technology -- Public key infrastructure -- Security requirements for signature creation applications
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.240.40
Word Count Estimation 41,498
Date of Issue 2010-09-02
Date of Implementation 2011-02-01
Quoted Standard GB/T 25064-2010
Regulation (derived from) Announcement of Newly Approved National Standards No. 4 of 2010 (total 159)
Issuing agency(ies) General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China
Summary This standard specifies the produce reliable electronic signature signature generation applications (SCA) safety requirements, including: defining a model for signature generation and signature generation environment functionality of the application model, provision applies to the functional model of all functional blocks general requirements, provision signature generation application security requirements of each functional module, in addition to SSCD. This standard applies to all used to generate a reliable electronic signature signature generation applications.

GB/T 25065-2010: Information security technology -- Public key infrastructure -- Security requirements for signature creation applications


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology. Public key infrastructure. Security requirements for signature creation applications ICS 35.240.40 L80 National Standards of People's Republic of China Information security technology - Public key infrastructure Safety requirements for signature generation application Issued on. 2010-09-02 2011-02-01 implementation Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China Standardization Administration of China released

Table of Contents

Introduction Ⅴ 1 Scope 1 2 Normative references 1 3 Terms and definitions 4 Abbreviations 3 5 signature generation function model 3 5.1 signature generation target 3 5.2 Functional Model 3 5.3 signature generation application 5 5.4 Secure Signature Creation Device 6 5.5 signature generation application instance 7 5.6 control and signature generation system has 7 6 7 signed data object information model 6.1 signer file 8 6.2 Signature Properties 8 6.3 9 data to be signed 6.4 9 formatted data to be signed 6.5 9 represents data to be signed 6.6 9 reliable electronic signature 6.7 Signed Data Object 9 6.8 signer identification data 9 7 SCA's overall security requirements 10 7.1 Basic Requirements 10 10 7.2 Trusted Path 7.3 Requirements distributed signature generation application 11 Requirements 7.4 pairs untrusted processes and communications ports 11 7.5 signature signature verification data objects afterwards 11 7.6 approach to security check data requirements 11 8 SD represents assembly 12 8.1 Function 12 12 8.2 Classification 8.3 the data type of content 12 8.4 SD unambiguous requirements 13 8.5 pairs of the display is not sensitive to security requirements SD 14 8.6 pairs of hidden text and activity code of claim 14 9 Signature Properties display assembly 14 10 signatures of people interacting components 15 10.1 UI senior principle 15 10.2 15 signatures calling 10.3 Signature process timeout rest 16 10.4 signer controls 16 10.5 signer using the feature to get 16 10.6 User Interface 16 11 signer identification assembly 17 11.1 general requirements 17 Signer identification data obtained 11.2 17 11.3 based on knowledge of the signer identification 17 Signer 11.4 biometric-based identification 17 Error handling 11.5 pairs signer authentication data 18 11.6 signer authentication data changes and reset the counter 18 11.7 signer authentication data the user interface 18 Safety 11.8 signer identification component requirements 18 12 DTBS format assembly 20 Function 12.1 DTBS format components 20 12.2 pairs of safety DTBS format assembly requirements 20 13 Data hash/hash assembly 20 13.1 Data hash/hash function component 20 13.2 DTBSR output resulting assembly 20 13.3 electronic signature input format 21 13.4 pairs of data hash/hash safety component requirements 21 14 SSCD/SCA communication component 22 14.1 interaction sequence 22 14.2 Establish a physical communication link 23 Read token information 23 14.3 SSCD 14.4 on a multi-application platform selection 24 SSCD function Get 24 14.5 Certificate Select the electronic signature creation data 14.6 24 14.7 signer authentication execution 25 14.8 Calculation of digital signature 25 Signature record 14.9 log 25 14.10 pairs security SSCD/SCA communication component of claim 25 15 SSCD/SCA component identification 25 Identification and 15.1 SCA 25 SSCD between 15.2 pairs of safety SSCD/SCA component identification requirements 26 16 SD synthesis module 26 17 SDO synthesis module 26 18 External input/output interface 27 27 18.1 SCA risk faced 27 18.2 Import Certificate Import 18.3 SD and signature attributes 27 18.4 SCA component downloads 27 18.5 pairs of input control security requirements 27 Appendix A (informative) General guidance signature data object 28 Annex B (informative) user interface guidelines 30 Annex C (informative) signature log assembly (SLC) 35 References 36

Foreword

This standard cryptographic algorithms involving relevant content, according to the national laws and regulations implemented. RSA and SHA-1 cryptographic algorithm in this standard references for example note shall adopt State Password Administration Institution specific use Corresponding algorithm approved. The standard reference EESSI standards "CWA14170- signature generation security requirements of the application." This standard Annex A, Annex B, Annex C is informative appendices. This standard by the National Safety Standardization Technical Committee (SAC/TC260) and focal points. This standard was drafted. Beijing VeriSign E-Commerce Service Co., Ltd., China Electronics Standardization Institute, Beijing Posts and Telecommunications the University. The main drafters of this standard. Liu Hailong, Novelty Retrieval Song Meina, Hubei Red Sea, Wang Yanming, Zhang Haisong, Yang Zhen, Xu Lei, Shao Zhe. Information security technology - Public key infrastructure Safety requirements for signature generation application

1 Scope

This standard specifies produce reliable electronic signature signature generation application (SCA) safety requirements, including. defining a signature Generation modeling environment models and signature generation applications; functional model applies to the general requirements of all the features of the module; Regulation Given signature generation application security requirements of each functional module, in addition to SSCD. The standards apply to all signature generation application for generating reliable electronic signatures.

2 Normative references

The following documents contain provisions which, through reference in this standard and become the standard terms. For dated references, subsequent Amendments (not including errata content) or revisions do not apply to this standard, however, encourage the parties to the agreement are based on research Whether the latest versions of these documents. For undated reference documents, the latest versions apply to this standard. GB/T 25064-2010 Information security technology - Public key infrastructure Electronic Signature Format Specification

3 Terms and Definitions

The following terms and definitions apply to this standard. 3.1 Reliable electronic signature reliableelectronicsignature Electronic signatures can meet the following criteria. electronic signature creation data used for electronic signature, electronic signature belonging to one exclusive; when signing electricity Sub signature creation data is controlled only by the electronic signatory; any changes after the signing of the electronic signature can be found; in the data message after signing Any changes to the form and content can be found. 3.2 Certificate identifier certificateidentifier A clear identifier certificate. 3.3 Electronic certification service provider certification-service-provider An entity or a legal or natural person, a certificate or provide other services related to electronic signatures. 3.4 Encryption device cryptographictoken Personal security device capable of performing cryptographic operations. The signature generation device that is an encryption device. 3.5 Data to be signed datatobesigned The complete electronic data to be signed. 3.6 Formatted data to be signed datatobesignedformatted DTBS has been formatted components, and in accordance with the type of signer SDO asked to select the correct order. 3.7 DTBS represents DTBS-representation By the signature generation application sent to the signature generation device, you need the data to be signed.

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 25065-2010_English be delivered?

Answer: Upon your order, we will start to translate GB/T 25065-2010_English as soon as possible, and keep you informed of the progress. The lead time is typically 4 ~ 7 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 25065-2010_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 25065-2010_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.