HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (18 Oct 2025)

GB/T 29767-2013 English PDF

US$529.00 · In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 29767-2013: Information security techniques -- Public key infrastructure -- Bridge Certification Authority leveled certificate specification
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 29767-2013English529 Add to Cart 4 days [Need to translate] Information security techniques -- Public key infrastructure -- Bridge Certification Authority leveled certificate specification Valid GB/T 29767-2013

PDF similar to GB/T 29767-2013


Standard similar to GB/T 29767-2013

GB/T 29246   GB/T 30279   GB/T 30276   GB/T 19713   GB/T 29766   GB/T 29765   

Basic data

Standard ID GB/T 29767-2013 (GB/T29767-2013)
Description (Translated English) Information security techniques -- Public key infrastructure -- Bridge Certification Authority leveled certificate specification
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.040
Word Count Estimation 23,289
Quoted Standard GB/T 16264.8-2005; GB/T 20518-2006; RFC 3647
Regulation (derived from) National Standards Bulletin No. 18 of 2013
Issuing agency(ies) General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China
Summary This standard specifies: Bridge CA certificate security classification system. This standard applies to: System certificate policy Road Bridge CA Design and Implementation. Bridge CA system developed, open, test, and can also refer to the use of the produ

GB/T 29767-2013: Information security techniques -- Public key infrastructure -- Bridge Certification Authority leveled certificate specification


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security techniques. Public key infrastructure. Bridge Certification Authority leveled certificate specification ICS 35.040 L80 National Standards of People's Republic of China Information security technology - Public key infrastructure Bridge CA classification system certificates Specification Issued on. 2013-09-18 2014-05-01 implementation Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China Standardization Administration of China released

Table of Contents

Preface Ⅰ Introduction Ⅱ 1 Scope 1 2 Normative references 1 3 Terms and definitions 4 Abbreviations 2 5 Certificate Security Assurance Level 2 5.1 Overview 2 5.2 Test Level 2 5.3 Primary 4 5.4 Basic Level 5 5.5 Intermediate 8 5.6 High 10 Appendix A (normative) Safety requirements for auditable events division level 14 Appendix B (normative) certificate level division 17 References 18

Foreword

This standard was drafted in accordance with GB/T 1.1-2009 given rules. This standard by the National Safety Standardization Technical Committee (SAC/TC260) and focal points. This standard was drafted. State Information Center, State Key Laboratory of Information Security. The main drafters of this standard. non-Mattress, Ren Jinjiang barbadensis Miller, Zhang Fan, energetic.

Introduction

The standard of security assurance level bridge CA certificate policy provides grading standards, the bridge CA system is divided into four application-level certificate Do not test level and a total of five levels, and explains the technical requirements of all levels. Applications are four levels. Beginner, basic, intermediate, advanced, and its Successive higher level of security. Test level certificates are used for cross-certification testing. The standard reference RFC3647, for other certificate policies at all levels have made it clear that to guide designers how to design and implement phase You should level certificate policy. Each level nine different aspects of the content requirements made to ensure that the certificate policy from beginner to advanced, its Along with increasing degree of safety, to adapt their security environment also will be more stringent. Information security technology - Public key infrastructure Bridge CA classification system certificates Specification

1 Scope

This standard specifies the bridge CA certificate security classification system. This standard applies to the design and implementation of system bridge CA certificate policy to. Development, open, test and product procurement system may also be bridge CA Referring use.

2 Normative references

The following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein Member. For undated references, the latest edition (including any amendments) applies to this document. GB/T 16264.8-2005 Information technology - OSI Directory - Part 8. a public key and attribute certificate frameworks (ISO / IEC 9594-8.2001, IDT) GB/T 20518-2006 Information security technology - Public key infrastructure - Digital certificate format RFC3647 Internet X.509 Public Key Infrastructure. Certificate Policy and Certificate operating framework (InternetX.509PublicKeyIn- frastructure. CertificatePolicyandCertificationPracticesFramework)

3 Terms and Definitions

GB/T 16264.8-2005 and as defined in the following terms and definitions apply to this document. 3.1 Public Key Infrastructure publickeyinfrastructure It supports public-key management system and provide identification, encryption, integrity and non-repudiation services infrastructure. 3.2 Cross-certification crosscertification Establish a trust relationship between the two CA, so that they can trust and rely on either a certificate issued by another process. 3.3 Cross-certification protocol memo cross-certificationmemorandumofagreement To determine the relationship between the two CA, provides for exchange after both enjoyed the trust level agreement. 3.4 Certificate Policy certificatepolicy A specified set of rules, indicating that the certificate of specific groups with common security requirements and/or application scope. 3.5 Entity CA entityCA Cross-certification requirements to help a specific root CA. 3.6 Subscriber subscriber CA from the entity receiving the digital certificate.

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 29767-2013_English be delivered?

Answer: Upon your order, we will start to translate GB/T 29767-2013_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 29767-2013_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 29767-2013_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.