| US$1219.00 · In stockDelivery: <= 8 days. True-PDF full-copy in English will be manually translated and delivered via email.
 GB/T 31504-2015: Information security technology -- Authentication and authorization -- Digital identity information service framework specification
 Status: Valid
 
	
		
			| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |  
			| GB/T 31504-2015 | English | 1219 | Add to Cart | 8 days [Need to translate] | Information security technology -- Authentication and authorization -- Digital identity information service framework specification | Valid | GB/T 31504-2015 |  
	 
       PDF similar to GB/T 31504-2015 
 Basic data             | Standard ID | GB/T 31504-2015 (GB/T31504-2015) |           | Description (Translated English) | Information security technology -- Authentication and authorization -- Digital identity information service framework specification |           | Sector / Industry | National Standard (Recommended) |           | Classification of Chinese Standard | L80 |           | Classification of International Standard | 35.040 |           | Word Count Estimation | 58,541 |           | Date of Issue | 2015-05-15 |           | Date of Implementation | 2016-01-01 |           | Quoted Standard | GB/T 25069-2010 |           | Regulation (derived from) | National Standard Announcement 2015 No. 15 |           | Issuing agency(ies) | General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China |           | Summary | This Standard specifies the digital identity information service reference model framework of XML Schema, namespaces, expansion mode and universal digital identity information object attribute types, but also defines a common digital identity information to create, query, modify and delete the message exchange format and processing rules. This Standard applies to the development of digital identity information and services, and guide the development of testing and related applications that type of system. | GB/T 31504-2015: Information security technology -- Authentication and authorization -- Digital identity information service framework specification---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
 Information security technology. Authentication and authorization. Digital identity information service framework specification
ICS 35.040
L80
National Standards of People's Republic of China
Information Security Technology Authentication and Authorization
Digital Identity Services Framework Specification
Issued on. 2015-05-15
2016-01-01 implementation
Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China
Standardization Administration of China released
 Table of ContentsIntroduction Ⅲ
Introduction Ⅳ
1 Scope 1
2 Normative references 1
3 Terms and definitions
4 Abbreviations 2
5 2 Compliance
6 namespace and general concepts 2
6.1 namespace 2
6.2 General Concepts 3
7 Reference Model 3
7.1 digital identity information service 3
7.2 digital identity information service reference model 3
7.3 digital identity information service security model 5
8 digital identity data XMLschema frame 6
8.1 Overview 6
8.2 Schemata guidelines 7
8.3 7 Extended Service
8.4 and synchronize the time value 8
8.5 Generic XML attribute 8
10 8.6 General data types
9 digital identity information service access framework 11
9.1 Overview 11
Over 9.2 Request Response Event Support 12
9.3 idS attributes and processing rules 12
9.4 timeStampXML attributes and processing rules 12
9.5 Status and error reports 13
9.6 General 15 error-handling rules
16 9.7 Resource Identifier
9.8 Options 16
9.9 General rules for handling the selection operation 17
9.10 request additional data and metadata 18
9.11 request additional data and metadata common processing rule 19
10 query data 20
10.1 Overview 20
10.2 \u003cQuery\u003e Element 20
10.3 \u003cQueryResponse\u003e Element 24
10.4 subject to conditions \u003cResultQuery\u003e and \u003cQueryItem\u003e Element 24
10.5 Query Processing Rule 24
Example 29 10.6 query processing rules
11 Creating a data object 29
11.1 Overview 29
11.2 \u003cCreate\u003e Element 29
11.3 \u003cCreateResponse\u003e Element 30
11.4 create a data object processing rule 30
12 Delete data object 32
12.1 \u003cDelete\u003e Element 32
12.2 \u003cDeleteResponse\u003e Element 33
12.3 deletion processing rules 33
13 35 modify data
13.1 \u003cModify\u003e Element 35
13.2 \u003cModifyResponse\u003e Element 36
13.3 modify processing rules 36
Example 39 13.4 Modify rule processing
14 39 Service Description
Appendix A (informative) Example 42 Query Processing Rules
Annex B (informative) Example 49 modify processing rules
References 52ForewordThis standard was drafted in accordance with GB/T 1.1-2009 given rules.
Please note that some of the content of this document may involve patents. Release mechanism of the present document does not assume responsibility for the identification of these patents.
This standard by the National Safety Standardization Technical Committee (SAC/TC260) and focal points.
This standard was drafted. Institute of Software, ZTE, Beijing Institute of Scientific and Technical Information.
The main drafters of this standard. FENG Deng, Zhang Min, Zhang Liwu, Zhang Yan, Fu Yanyan, paragraph Meijiao, Zhang Yan, Li Qiang.IntroductionDigital identity as a virtual identification of the body, its various means of support network activity. Digital identity management is the digital world safe
The core of the whole transaction, and provide support for the identification, authorization, access control, account access, and various other applications and user attributes. However, the current number
Word identity by serving a variety of self-management, not only in multiple formats, management confusion, and identity between different service provider information is difficult
Interactive, security and privacy can not be adequately protected. There is an urgent need for China's digital identity management technology for standardized management,
Make digital identity information users can access accurate digital identity information, identity provider can properly maintain and manage digital identity information,
Ensure the security and privacy of users of digital identity information.
This standard is the basis for the standardization of digital identity management standards, we are committed to regulate a variety of digital identity information services. This standard defines a
Species common scalable digital identity and digital identity framework XMLSchema information access message format supports a variety of types of
Word identity representation and access, allowing users to customize the format extension. Define standardized support for digital identities and information access procedures for a variety of
Types of digital identity services to establish a unified service framework specification.
This standard reference LibertyAliance file LibertyID-WSFDataServicesTemplatev2.1. In the original document
Increased notes and digital identity information reference model section of the standard range basis.
Information Security Technology Authentication and Authorization
Digital Identity Services Framework Specification1 ScopeThis standard defines the digital identity information service reference model framework XMLSchema, the namespace extension and general manner
Digital identity information object attribute types, but also defines a common digital identity information to create, query, modify, and delete the message format to exchange
And processing rules.
This standard applies to the development of digital identity information and services, and guide the development of testing and related applications that type of system.2 Normative referencesThe following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein
Member. For undated references, the latest edition (including any amendments) applies to this document.
GB/T 25069-2010 Information security technology terms3 Terms and DefinitionsGB/T 25069-2010 and as defined in the following terms and definitions apply to this document.
3.1
Account account
A formal commercial agreement for handling the subject with a service provider and service transactions between the parties.
3.2
Authenticated identity authenticatedidentity
A has been asserted by the identification of the body, this may represent the body.
3.3
Identification authentication
A certain level of credibility in the specified claimed identity of a body in the process.
3.4
Identification authority authenticationauthority
It is to identify the identity provider. An identification of the identity of a subject provider.
3.5
Authorization authorization
Based on assessment of the main digital identity information to determine whether a body of resources to implement the process to specify the type of access. one
Once a subject is authenticated, it may have some type of access.
3.6
Digital identity digitalidentity
Body in the Internet virtual identity, said associated attribute information associated with the body, which usually identifies the uniqueness of an account.
 
 Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 31504-2015_English be delivered?Answer: Upon your order, we will start to translate GB/T 31504-2015_English as soon as possible, and keep you informed of the progress. The lead time is typically 5 ~ 8 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 31504-2015_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 31504-2015_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries Question 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected] . In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.    |