| 
           
             
       
   
   US$219.00 ยท In stock Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 32927-2016: Information security technology -- Security architecture of mobile smart terminal Status: Valid    
      
    
  
	
		
			| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF | 
		 
			| GB/T 32927-2016 | English | 219 | 
   Add to Cart
   | 
                    3 days [Need to translate]
                 | 
                    Information security technology -- Security architecture of mobile smart terminal
                 | Valid | 
                    GB/T 32927-2016
                 | 
		 
	 
     
     
  
	 
       PDF similar to GB/T 32927-2016 
    
   
    
     
          
  
  
    
  Basic data             |  Standard ID  |          GB/T 32927-2016 (GB/T32927-2016) |               |  Description (Translated English)  |          Information security technology -- Security architecture of mobile smart terminal |               |  Sector / Industry  |          National Standard (Recommended) |               |  Classification of Chinese Standard  |          L80 |               |  Classification of International Standard  |          35.040 |               |  Word Count Estimation  |          11,159 |               |  Date of Issue  |          2016-08-29 |               |  Date of Implementation  |          2017-03-01 |               |  Regulation (derived from)  |          National Standard Announcement 2016 No.14 |               |  Issuing agency(ies)  |          General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China |         
  GB/T 32927-2016: Information security technology -- Security architecture of mobile smart terminal ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.  
Information security technology - security architecture of mobile smart terminal
ICS 35.040
L80
National Standards of People's Republic of China
Information Security Technology Mobile Intelligent Terminal Security Architecture
2016-08-29 released
2017-03-01 implementation
General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China
China National Standardization Management Committee released
Directory
Preface I
Introduction II
1 Scope 1
2 normative reference document 1
3 terms and definitions, abbreviations 1
3.1 Terms and definitions 1
3.2 Abbreviations 2
4 Mobile intelligent terminal security architecture 2
4.1 Overview of security architecture 2
4.2 Safety objectives 3
5 security requirements for mobile smart terminals 3
5.1 hardware security 3
5.2 system software security 3
5.3 Application software security 4
5.4 User data security 5
5.5 interface security 5
Reference 7
Foreword
This standard is drafted in accordance with the rules given in GB/T 1.1-2009.
This standard is proposed by the National Information Security Standardization Technical Committee (SAC/TC260).
The drafting of this standard. Ministry of Industry and Information Technology Telecommunications Research Institute, Beijing University of Posts and Telecommunications, China Mobile Communications Corporation, China United Network
Communication Group Co., Ltd., Beijing Spreadtrum Transtech Services Communication Technology Co., Ltd., Baidu Online Network Technology (Beijing) Co., Ltd.
The main drafters of this standard. Pan Juan, Ning Hua, Liang Hongliang, Hong Hongwei, Yang Guanghua, He Shen, Dong Hui, Shi Yan Shan, Man Zhiyong.
Introduction
With the wide range of mobile intelligent terminal applications and the continuous expansion of the use of the process of security issues are more and more users
Of concern. In recent years, malicious fees, eavesdropping, user information leakage and other security incidents frequently, so that users of mobile intelligent terminal security
Concerns, and thus affect the development of mobile smart terminals and mobile Internet applications. The development of this standard, aimed at mobile intelligent terminal through the security
Full structure, to guide the construction of mobile intelligent terminal security standard system, standard mobile intelligent terminal involved in the design, development, testing, assessment work,
Improve the security level of mobile intelligent terminals, reduce the risks faced by mobile intelligent terminals, protect users' personal security and national security, promote
The healthy development of the Internet as a whole.
The cryptographic applications referred to in this standard shall be implemented in accordance with the provisions of the State Administration of Taxation.
This standard gives the mobile intelligent terminal security architecture, and put forward the security requirements, in order to facilitate innovation and development of mobile intelligent terminal security
Structure of the specific part of the technical realization of the way, methods do not do.
Information Security Technology Mobile Intelligent Terminal Security Architecture
1 Scope
This standard puts forward the security architecture of mobile intelligent terminal, and describes the security requirements of mobile intelligent terminal.
This standard applies to the design, development, testing and evaluation of mobile intelligent terminals.
2 normative reference documents
The following documents are indispensable for the application of this document. For dated references, only the dated edition applies to this article
Pieces. For undated references, the latest edition (including all modifications) applies to this document.
Information security technical terminology GB/T 25069-2010
3 terms and definitions, abbreviations
3.1 Terms and definitions
GB/T 25069-2010 Definitions and the following terms and definitions apply to this document.
3.1.1
Security mechanism securitymechanism
To achieve security functions, to provide a set of security services, a combination of basic methods.
3.1.2
Security architecture securityarchitecture
A collaborative architecture consisting of multiple secure modules.
3.1.3
Security audit securityaudit
The monitoring and monitoring of various events and behaviors of information systems, and the corresponding actions for specific events and actions.
3.1.4
Code signatures codesignature
A mechanism that uses a digital signature mechanism to sign all or part of the code by an entity with signed permission.
3.1.5
Access control
A means of ensuring that the resources of the data processing system can only be accessed by the authorized entity by authorized means.
3.1.6
Vulnerability
Computer information system in the demand, design, implementation, configuration, operation and other processes, intentional or unintentional defects. These defects do not
The same form exists in the computer information system at all levels and links, once the use of malicious subjects, it will computer information system
Of the security caused by damage, thus affecting the normal operation of computer information systems.
3.1.7
Authorize authorization
After the user identity is authenticated, according to the pre-set security policy, the process of granting the user the corresponding authority.
   
   
  
  
    
  Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 32927-2016_English be delivered?Answer: Upon your order, we will start to translate GB/T 32927-2016_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 32927-2016_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 32927-2016_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs):  List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to  [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.  
        
   
        
       
          
               
 
          |