| US$819.00 · In stockDelivery: <= 6 days. True-PDF full-copy in English will be manually translated and delivered via email.
 GB/T 31491-2015: Wireless network access control technical specification
 Status: Valid
 
	
		
			| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |  
			| GB/T 31491-2015 | English | 819 | Add to Cart | 6 days [Need to translate] | Wireless network access control technical specification | Valid | GB/T 31491-2015 |  
	 
       PDF similar to GB/T 31491-2015 
 Basic data             | Standard ID | GB/T 31491-2015 (GB/T31491-2015) |           | Description (Translated English) | Wireless network access control technical specification |           | Sector / Industry | National Standard (Recommended) |           | Classification of Chinese Standard | L78 |           | Classification of International Standard | 35.110 |           | Word Count Estimation | 39,316 |           | Date of Issue | 2015-05-15 |           | Date of Implementation | 2016-01-01 |           | Quoted Standard | GB/T 15629.2-2008; GB/T 15629.3-2014; GB 15629.11-2003; GB 15629.11-2003/XG1-2006; GB 15629.1101-2006; GB 15629.1102-2003; GB/T 15629.1103-2006; GB 15629.15-2010; GB/T 15843.1-2008; GB/T 15843.2-2008; GB/T 15843.3; GB/T 28455-2012; GB/T 28925-2012; GB/T 29768-2013; GB/T 29828-2013; GB/T 30001.1-2013; ISO/IEC 9798-3-1988/AMD 1-2010; ISO/IEC 11770-1; ISO/IEC 20009-2-2013; RFC 768; RFC 793; GB 15629.1104-2006; GM/T 0002-2012 |           | Regulation (derived from) | National Standard Announcement 2015 No. 15 |           | Issuing agency(ies) | General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China |           | Summary | This Standard provides a general method of network access security access control process. This Standard applies to a variety of wireless network access control field WLAN, WPAN, WSN, RFID, etc., is also applicable to a variety of wired network access control field LAN, PLC, PON, etc. | GB/T 31491-2015: Wireless network access control technical specification---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.Wireless network access control technical specification
ICS 35.110
L78
National Standards of People's Republic of China
Wireless network access control specifications
Issued on. 2015-05-15
2016-01-01 implementation
Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China
Standardization Administration of China released
 Table of ContentsPreface Ⅰ
Introduction Ⅱ
1 Scope 1
2 Normative references 1
3 Terms and definitions 2
4 Abbreviations 3
General Model 5 Network Access 4
6 5 network access control mechanism
6.1 Overview 5
6.2 Share Information Management 5
6.3 Control Strategy consultation 6
6.4 authentication protocol 6
6.5 share information consultation 6
6 6.6 data transfer protection
7 control policy negotiation 6
7.1 Overview 6
7.2 control policy negotiation request packet 7
7.3 Control Strategy negotiation response packet 7
8 8 Authentication Protocol
8.1 Overview 8
8.2 two entity authentication mechanisms 8
8.3 three entity authentication mechanisms 14
9 20 negotiated agreements to share information
9.1 Unicast share information consultation 20
9.2 Multicast share information consultation 22
Appendix A (normative) Application 25
Annex B (informative) mode 29
References 34ForewordThis standard was drafted in accordance with GB/T 1.1-2009 given rules.
This standard by the National Information Technology Standardization Technical Committee (SAC/TC28) and focal points.
This standard is mainly drafted by. Xi'an Electric Co., Ltd. Jietong wireless network communications, wireless network security technology National Engineering Experiment
Room, State Radio Monitoring Center Testing Center, China Electronics Standardization Institute, Xi'an University of Posts and Telecommunications, Xi'an University of Electronic Science and Technology,
State Administration of commercial password password testing center, State Key Laboratory of Information Security, China Information Security Certification Center, National Information Security
Engineering Technology Research Center, the National Computer Network Emergency Response Technical Coordination Center, PLA Information Security Evaluation and Certification Center,
Guangzhou GCI Science & Technology Co., Ltd., Chongqing University of Posts and Telecommunications, Yulong Computer Telecommunication Scientific (Shenzhen) Co., Renmin University of China, Guilin
University of Electronic Science and Technology, China Telecom, the State Information Center, Peking University Shenzhen Graduate School, limited Beijing CEC Huada Electronic Design
Ltd., Southeast University, Shenzhen, China and Macao-Technology Co., Ltd., Beijing Liugewantong Microelectronics Technology Co., Ltd., Beijing Network Pui
Co-Technology Co., Ltd., Hong Haoming Chuan Technology (Beijing) Co., Ltd., PLA Information Engineering University, Jiangnan Computing Technology Research
, Beijing University of Posts and Telecommunications Beijing Wulong technology companies, Peking University Founder Group Corporation, Beijing Government Network Management Center, Beijing urban heat
Point Information Co., Ltd., Beijing Hua Guang Tong Technology Development Co., Maipu Communication Technology Co., Ltd., Beijing Tianyi Science and Technology Co., integration
Division, Broadband Wireless IP Standard Working Group, WAPI Industry Alliance.
The main drafters of this standard. Huang Zhenhai, Iron Man-xia, Lai Xiaolong, Song from the column, Wang Yumin, Cao, Zhu Zhixiang, FENG Deng, Li Dawei, Chen Xiaohua,
Wenzhong Hui, Zhuolan, Xiao Yue Lei Shumin, Hu Yanan, Li Guangsen, high waves, Liu Ping, His Odes non Mattress, Li Qin, Liang Zhaohui, Liangqiong Wen, Zhang Ling changed,
Luo Xuguang, Zhao Long Hua, Zhang, Xu Pingping, ice Qiu Hong, Zhu Yuesheng, Pan Feng, blue sky, Wang Zhijian, Wang Ke, Zhang Guoqiang, Yang Hong, Tian Xiaoping, Tian Hui,
Zhang Yongqiang, Shou Guoliang, Mao Liping, Caozhu Qing, Guo Zhigang, Gao Hong, Han Kang, Chen Zhifeng, Li Dawei, Wang Liren, plateau.IntroductionIn communication networks, especially wireless networks, unauthorized terminal device can be physically connected to the network, or an authorized terminal device
Network physical connection terminal is not necessarily desirable. Therefore, before the terminal and network communication, mutual authentication need each other's identity,
Then authorize access, to ensure reliable communication.
This standard describes the wireless network access control mechanisms that regulate the access control network.
When issuing authority of the document drew attention to the statement of compliance with this document may involve 8.2.2.2,8.3.2 etc. and "a three-step handshake protocol
Method "," an entity achieve access to the public key, and certificate validation method of mutual authentication "and other patents related to the use.
The issuing authority for the patent document authenticity, validity and scope without any position.
The patent holder has to ensure that the issuing authority of the document, he was willing to reasonable and non-discriminatory terms and conditions with any applicant,
Patent licensing negotiations. The patent holder's statement has been filed in the present document issuing authority. Information is available through the following link
Ways.
Patentee. Xi'an Electric Jietong Wireless Network Communication Co., Ltd.
Address. Xi'an High-tech Zone Xi'an Software Park Road No. 68 Qin Pavilion A201
Contact. Liu Changchun
Postal Code. 710075
Email. [email protected]
Phone. 029-87607836
Fax. 029-87607829
Please note that in addition to the above patents, some of the contents of this document may still involve patents. The issuing authority of this document does not undertake to recognize these special
Lee responsibility.
Wireless network access control specifications1 ScopeThis standard provides a general method for network access security access control process.
This standard applies to a variety of wireless network access WLAN, WPAN, WSN, RFID and other control areas, but also for LAN, PLC,
PON various wired network access control and other fields.2 Normative referencesThe following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein
Member. For undated references, the latest edition (including any amendments) applies to this document.
Between GB/T 15629.2-2008 Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks Specific requirements
Part 2. LLC
Between GB/T 15629.3-2014 Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks Specific requirements
Part 3. with collision detection Carrier Sense Multiple Access (CSMA/CD) Access Method and Physical Layer Specifications
Inter GB 15629.11-2003 Information technology - Telecommunications and information exchange between local area networks and metropolitan area networks-specific requirements -
Part 11. Wireless LAN Medium Access Control and Physical Layer Specifications
GB 15629.11-2003/XG1-2006 Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks Laid
Statutory requirements - Part 11. Wireless LAN Medium Access Control and Physical Layer Specifications No. 1 amendments
Inter GB 15629.1101-2006 Information technology - Telecommunications and information exchange between local area networks and metropolitan area networks Specific requirements
Part 11. Wireless LAN Medium Access Control and Physical Layer Specifications. 5.8GHz band High Speed \u200b\u200bPhysical Layer Specification
Inter GB 15629.1102-2003 Information technology - Telecommunications and information exchange between local area networks and metropolitan area networks Specific requirements
Part 11. Wireless LAN Medium Access Control and Physical Layer Specifications. 2.4GHz band higher speed Physical Layer Extension
Between GB/T 15629.1103-2006 Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks Specific requirements
Part 11. Wireless LAN Medium Access Control and Physical Layer Specifications. Additional domain management practices
Inter GB 15629.1104-2006 Information technology - Telecommunications and information exchange between local area networks and metropolitan area networks Specific requirements
Part 11. Wireless LAN Medium Access Control and Physical Layer Specifications. 2.4GHz band Higher Data Rate Extension Specification
Between GB/T 15629.15-2010 Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks Specific requirements
Part 15. Low-speed wireless personal area network (WPAN) MAC and physical layer specifications
GB/T 15843.1-2008 Identification Information technology - Security techniques - Entity Part 1. Overview
GB/T 15843.2-2008 Identification Information technology - Security techniques - Entity - Part 2. Mechanisms using symmetric encryption algorithms
GB/T 15843.3 Identification Information technology - Security techniques - Entity - Part 3. Digital Signature Technology Mechanism
GB/T 28455-2012 Information security technology into a trusted third party entity authentication and access architecture specification
GB/T 28925-2012 Information technology - Radio frequency identification 2.45GHz air interface protocol
GB/T 29768-2013 Information technology - RFID 800/900MHz air interface protocol
GB/T 29828-2013 Information security technology trusted computing architecture specification trusted connections
GB/T 30001.1-2013 Information technology - to pay part of the first RF-based mobile. RF interface
GM/T 0002-2012 SM4 block cipher
ISO /IEC 9798-3.1998/Amd.1.2010 Information technology - Security techniques - Entity Identification - Part 3. Digital Signature
 Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 31491-2015_English be delivered?Answer: Upon your order, we will start to translate GB/T 31491-2015_English as soon as possible, and keep you informed of the progress. The lead time is typically 4 ~ 6 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 31491-2015_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 31491-2015_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries Question 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected] . In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.    |