HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (12 Oct 2025)

GB/T 29244-2024 English PDF

US$439.00 ยท In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 29244-2024: Cybersecurity technology - Security specification for office devices
Status: Valid

GB/T 29244: Evolution and historical versions

Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 29244-2024English439 Add to Cart 4 days [Need to translate] Cybersecurity technology - Security specification for office devices Valid GB/T 29244-2024
GB/T 29244-2012English279 Add to Cart 3 days [Need to translate] Information security technology -- Basic security requirements for office devices Valid GB/T 29244-2012

PDF similar to GB/T 29244-2024


Standard similar to GB/T 29244-2024

GB/T 29246   GB/T 28458   GB/T 28454   GB/T 29240   

Basic data

Standard ID GB/T 29244-2024 (GB/T29244-2024)
Description (Translated English) Cybersecurity technology - Security specification for office devices
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.030
Word Count Estimation 22,289
Date of Issue 2024-09-29
Date of Implementation 2025-04-01
Older Standard (superseded by this standard) GB/T 29244-2012,GB/T 38558-2020
Issuing agency(ies) State Administration for Market Regulation, China National Standardization Administration

GB/T 29244-2024: Cybersecurity technology - Security specification for office devices

---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35.030 CCSL80 National Standard of the People's Republic of China Replaces GB/T 29244-2012, GB/T 38558-2020 Network security technology office equipment safety specifications Released on 2024-09-29 2025-04-01 Implementation State Administration for Market Regulation The National Standardization Administration issued

Table of Contents

Preface III 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 2 5 General 2 6 Safety technical requirements 2 6.1 Security Function Requirements 2 6.2 Security requirements 4 7 Evaluation Methods 6 7.1 Safety Function Requirements Evaluation Method 6 7.2 Security Assurance Requirements Assessment Method 8 Appendix A (Normative) Classification of office equipment and classification of safety technical requirements 11 Appendix B (Normative) Classification and evaluation methods of office equipment 14

Foreword

This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents" Drafting. This document replaces GB/T 29244-2012 "Information security technology - Basic safety requirements for office equipment" and GB/T 38558-2020 Compared with GB/T 29244-2012 and GB/T 38558-2020, "Information Security Technology Office Equipment Security Test Method" has In addition to adjustments and editorial changes, the main technical changes are as follows. --- Added overview (see Chapter 5); --- Changed the terms and definitions (see Chapter 3, Chapter 3 of GB/T 29244-2012 edition); --- Added "firmware security" related requirements (see 6.1.3) and corresponding evaluation methods (see 7.1.3); --- Added "safety assurance requirements" and corresponding assessment methods (see 6.2 and 7.2); ---Change "security audit" to "logging and auditing" (see 6.1.4, 4.3 of GB/T 29244-2012 edition); --- Change "session" to "communication security" (see 6.1.6, 4.7 of GB/T 29244-2012 edition); --- Change "data management" to "user data security" (see 6.1.5, 5.2 of GB/T 29244-2012 edition); ---Change "Security attribute management" to "Configuration security" (see 6.1.8, 5.1 of GB/T 29244-2012 edition). Please note that some of the contents of this document may involve patents. The issuing organization of this document does not assume the responsibility for identifying patents. This document was proposed and coordinated by the National Cybersecurity Standardization Technical Committee (SAC/TC260). This document was drafted by. China Electronics Technology Standardization Institute, National Computer Network Emergency Response Technical Processing Coordination Center, National Information Technology Security Research Center, Zhuhai Pantum Electronics Co., Ltd., Peking University, Epson (China) Co., Ltd., Fujifilm Business Innovation (China) Co., Ltd., Changyang Technology (Beijing) Co., Ltd., Hewlett-Packard China Co., Ltd., Lenovo (Beijing) Co., Ltd., Venusstar Information Technology Group Co., Ltd., Konica Minolta (China) Investment Co., Ltd., Canon (China) Co., Ltd., Guangdong Radio and Television Metrology and Testing Group Co., Ltd., National Office Equipment and Consumables Quality Inspection and Testing Center (Tianjin Tianfu Testing Technology Co., Ltd.), Ideal (China) Science Industrial Co., Ltd., Beijing Gaode Pinchuang Technology Co., Ltd., Sharp Office Equipment (Changshu) Co., Ltd., Zhuhai Tianwei Pegasus Printing Supplies Co., Ltd. Co., Ltd., Brother (China) Commercial Co., Ltd., Hangzhou Anheng Information Technology Co., Ltd., Toshiba Tec Information Systems (Shenzhen) Co., Ltd. Co., Ltd., H3C Technologies Co., Ltd., Beijing Shuanxing Technology Co., Ltd., Beijing Zhongke Weilan Technology Co., Ltd., Tianjin Optoelectronic Communication Technology Co., Ltd. Co., Ltd., Institute of Software, Chinese Academy of Sciences, and State Grid Blockchain Technology (Beijing) Co., Ltd. The main drafters of this document are. Yang Jianjun, Sun Yan, Zhang Dongju, Shangguan Xiaoli, Li Yixi, Wang Xizi, Zhao Xinqiang, Peng Jibing, Zhang Zhijun, Chen Yunran, Xie Anming, Yu Liangwen, Zhu Qing, Zhao Hua, Yang Fengchen, Li Ruxin, Yang Tianshi, Chen Ting, Yang Chen, Tang Di, Zhang Yu, Hu Quan, Wang Zhengliang, Fan Zhiguo, Qiao Huaixin, He Gang, Chen Xing, Wang Hengbo, Chen Yong, Wan Xiaolan, Liu Yuhong, Guo Wei, Sun Fang, Yan Min, and Shi Zhuyu. The previous versions of this document and the documents it replaces are as follows. ---First published in.2012 as GB/T 29244-2012, and first published in 2020 as GB/T 38558-2020; ---This is the first revision. Network security technology office equipment safety specifications

1 Scope

This document specifies the security function requirements, security assurance requirements and evaluation methods for office equipment. This document applies to the procurement, evaluation, maintenance and management of office equipment, and also to the safe design, implementation and operation of office equipment.

2 Normative references

The contents of the following documents constitute essential clauses of this document through normative references in this document. For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to This document. GB/T 18336 Information technology security technology Information technology security assessment criteria GB/T 25069 Information security technical terms GB/T 29829 Information security technology trusted computing cryptographic support platform function and interface specification

3 Terms and definitions

The terms and definitions defined in GB/T 18336 and GB/T 25069 and the following apply to this document. 3.1 Office equipmentofficedevice Equipment used to produce or process electronic or other media files. Note. Office equipment mainly refers to equipment with one or more functions of printing, scanning, faxing and copying. 3.2 Administrator A user who is authorized to manage some or all parts of an office device. 3.3 User An entity (human or information technology entity) that operates or interacts with office equipment. 3.4 User data userdata Data created by or for a user that does not affect the operation of the security functions of the office equipment. Note. User data includes user document data and user function data. 3.5 Nonvolatile storage Memory in which stored data is not lost when the power is turned off. Note. Non-volatile memory mainly includes built-in or external hard disk, universal serial bus (USB) disk, secure digital (SD) card, and flash memory. 3.6 Firmware Programs that implement office equipment interface communications, security functions, data parsing, image processing, engine control, etc.