|
US$979.00 · In stock Delivery: <= 7 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 29827-2013: Information security technology -- Trusted computing specification -- Motherboard function and interface of trusted platform Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 29827-2013 | English | 979 |
Add to Cart
|
7 days [Need to translate]
|
Information security technology -- Trusted computing specification -- Motherboard function and interface of trusted platform
| Valid |
GB/T 29827-2013
|
PDF similar to GB/T 29827-2013
Basic data | Standard ID | GB/T 29827-2013 (GB/T29827-2013) | | Description (Translated English) | Information security technology -- Trusted computing specification -- Motherboard function and interface of trusted platform | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L40 | | Classification of International Standard | 35.080 | | Word Count Estimation | 44,425 | | Quoted Standard | GB/T 29829-2013; UEFI V2.1 | | Regulation (derived from) | National Standards Bulletin No. 22 of 2013 | | Issuing agency(ies) | General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China | | Summary | This standard specifies the composition of the board of trusted platform structure, chain of trust building processes, functional interface. This standard applies based on the design, production and use of the Trusted Platform Module Trusted Platform cont |
GB/T 29827-2013: Information security technology -- Trusted computing specification -- Motherboard function and interface of trusted platform ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology. Trusted computing specification. Motherboard function and interface of trusted platform
ICS 35.080
L40
National Standards of People's Republic of China
Information security technology trusted computing specifications
Trusted Platform Interface Board Features
Issued on. 2013-11-12
2014-02-01 implementation
Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China
Standardization Administration of China released
Table of Contents
Preface Ⅰ
1 Scope 1
2 Normative references 1
3 Terms and definitions
4 Abbreviations 3
4 5 composition structure
Trust chain transfer 5 6
7 6 Integrity Measurement
8 9 initial measure
9 traditional BIOS Integrity Measurement 11
10 UEFIBIOS integrity metric 14
11 Trusted Platform Interface Board Features 17
Foreword
This standard was drafted in accordance with GB/T 1.1-2009 given rules.
This standard by the National Safety Standardization Technical Committee (SAC/TC260) and focal points.
Drafting of this standard. Beijing University of Technology, China Great Wall Computer Shenzhen Co., Ltd., Nanjing Byosoft limited stock
The company, CASIC hospital seven hundred and six, Wuhan University, China Research Center of overall CETC Information Engineering, Beijing Long
Core Branch Technical Service Center Co., Ltd., Jiangnan Institute of Computing Technology, Rui Da Information Security Industry Co., Ltd., in the Security Technology Group
Ltd., China Shipbuilding Industry Corporation 707, the Beijing Chinese Academy of Sciences Software Research Center, Beijing Huatai Heng Tai Technology Co., Ltd., Beijing Chao-yi
Century Network Technology Co., Ltd., Huawei Technologies Co., Gui Lin Changhai Technology Co., Ltd., China Electronics Standardization Institute
The study.
Drafters of this standard. Shen Chang-xiang, Hanyong Fei, Zhang, crown, Lin Shi Da, Xu Mindy, Wangzheng Peng, Jiang Zhixiang, Zhao Lina Zhou Yi-hua,
Shi Ming, Zhang Bin, Ray hole, Huanguo Zhang, Wang Wenjie, Huming Chang, Wu Xinjun, Chen Lin, Li Dadong, Wang Ran, Charles Zhang, Fang Ai, Tong Guangsheng, Xu Shu Huan,
Li Chen, Jia Bing, Du Zhongping, Du Hui, Xie dry, Zhao Bo, Zhang Chao, Wu Yong, Shiliang Jun, Ma Yinsheng, Guo Jingchuan, WORKER, Song Yang, Gao Zhan, Chinese New Year song,
Yu Fajiang, Jordan Chan, Cai Ye, Yuanai Dong, Zhuang jade, Ying Ming Zeng, Sun Yongquan, Duan Lijuan, Song Jing, Zhu He Xin, Guo Linger, Liu Zhijun, Teng Zhigang,
Jin gushing, Guo Yi, Xiao Yi, SUN Sheng Chao, Liu Jun, Chen Ying, Zou Na.
Information security technology trusted computing specifications
Trusted Platform Interface Board Features
1 Scope
This standard specifies the composition of the board trusted platform structure, chain of trust build process, functional interface.
This standard applies to based on the design, production and use of the Trusted Platform Module Trusted Platform control board.
2 Normative references
The following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein
Member. For undated references, the latest edition (including any amendments) applies to this document.
GB/T 29829-2013 Information security technology trusted computing platform password support functions and interface specifications
UEFIV2.1 Unified Extensible Firmware Interface Specification (UnifiedExtensibleFirmwareInterfaceSpecification)
3 Terms and Definitions
The following terms and definitions apply to this document.
3.1
Trusted Root rootoftrust
Corresponds TPCM module.
3.2
Amount of credibility root rootoftrustformeasurement
Can be a reliable measure of the integrity calculation engine, it is the starting point of trust transport chain.
3.3
Trusted storage root rootoftrustforstorage
It can be a reliable and secure storage calculation engine.
3.4
Credible reports root rootoftrustforreporting
A report can be reliably trusted root store calculation engine of the information stored.
3.5
General Equipment generaldevice
In the original PC motherboard compatible hardware devices, including a central processing unit (CPU), external memory, random access memory, video control
And so on.
3.6
The initial read-only memory bootROM
It provides the lowest level of the firmware in computer hardware settings during startup.
Note. The initial read-only memory in the composition and structure is divided into BootBlock MainBlock two parts, divided according to the type of traditional BIOS and UEFIBIOS.
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 29827-2013_English be delivered?Answer: Upon your order, we will start to translate GB/T 29827-2013_English as soon as possible, and keep you informed of the progress. The lead time is typically 4 ~ 7 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 29827-2013_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 29827-2013_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|