HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (19 Oct 2025)

GB/T 34975-2017 English PDF

US$359.00 · In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 34975-2017: Information security technology -- Security technical requirements and testing and evaluation approaches for application software of smart mobile terminals
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 34975-2017English359 Add to Cart 4 days [Need to translate] Information security technology -- Security technical requirements and testing and evaluation approaches for application software of smart mobile terminals Valid GB/T 34975-2017

PDF similar to GB/T 34975-2017


Standard similar to GB/T 34975-2017

GB/T 35273   GB/T 34953.4   GB/T 34953.2   GB/T 34977   GB/T 34976   

Basic data

Standard ID GB/T 34975-2017 (GB/T34975-2017)
Description (Translated English) Information security technology -- Security technical requirements and testing and evaluation approaches for application software of smart mobile terminals
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.040
Word Count Estimation 18,191
Date of Issue 2017-11-01
Date of Implementation 2018-05-01
Regulation (derived from) National Standard Announcement 2017 No. 29
Issuing agency(ies) General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China

GB/T 34975-2017: Information security technology -- Security technical requirements and testing and evaluation approaches for application software of smart mobile terminals


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology-Security technical requirements and testing and evaluation approaches for application software of smart mobile terminals ICS 35.040 L80 National Standards of People's Republic of China Information Security Technology Mobile Intelligent Terminal Application Software Safety technical requirements and test evaluation methods Posted.2017-11-01 2018-05-01 implementation General Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China China National Standardization Administration released Directory Preface Ⅰ 1 Scope 1 2 Normative references 1 3 Terms and definitions 1

4 safety technical requirements

4.1 safety function requirements 4.2 security requirements 4 5 test evaluation method 6 5.1 Safety Requirements Test 6 5.2 Security Requirements Testing 11

Foreword

This standard was drafted in accordance with the rules given in GB/T 1.1-2009. This standard by the National Information Security Standardization Technical Committee (SAC/TC260) and focal point. This standard was drafted unit. Third Ministry of Public Security Institute (Ministry of Public Security Computer Information System Product Quality Supervision and Inspection Center), Hangzhou, Constant Information Technology Co., Ltd., East China Normal University, China Electronics Standardization Institute, China Information Security Institute Co., Ltd., China Information and Communication Research Institute, China Mobile Communications Corporation, East China University of Technology, National Information Center. The main drafters of this standard. Yu You, Zhang Yan, Lu Zhen, He Dao Jing, Tang Di, Gu Jian, Shen Liang, Yang Yuan Yuan, Chen Yan, Yang Chen, Xu Yu- Sun Xiaoping, Lin Jiajun, Yang Zhengjun, Pan Juan, Qiu Qin, Yuan Jie, Zhang Heng. Information Security Technology Mobile Intelligent Terminal Application Software Safety technical requirements and test evaluation methods

1 Scope

This standard specifies the mobile intelligent terminal application software security technology requirements and test evaluation methods. This standard applies to mobile intelligent terminal application software development, operation and maintenance of the life cycle of the process of security protection and test evaluation, Not suitable for mobile intelligent terminal malware evaluation.

2 Normative references

The following documents for the application of this document is essential. For dated references, only the dated version applies to this article Pieces. For undated references, the latest edition (including all amendments) applies to this document. GB/T 18336.3-2015 Information Technology Security Technology Information Technology Security Assessment Guidelines Part 3. Security components Information technology - Security terminology

3 Terms and definitions

GB/T 18336.3-2015 and GB/T 25069-2010 defined by the following terms and definitions apply to this document. 3.1 Mobile smart terminal smartmobileterminal Access to the public mobile communication network, with an operating system, users can install and uninstall the application software mobile communication terminal products. 3.2 Mobile smart terminal operating system operatingsystemofsmartmobileterminal The most basic system software of mobile intelligent terminal is used to control and manage various hardware and software resources of mobile intelligent terminal and provide application Program development interface. 3.3 Mobile intelligent terminal applications applicationsoftwareofsmartmobileterminal Applications developed for mobile smart terminals include third-party applications pre-installed on mobile smart terminals, as well as internet information services Service providers can download, install and upgrade applications through mobile application distribution platforms such as websites and application stores.

4 safety technical requirements

4.1 safety function requirements 4.1.1 installation and unloading safety 4.1.1.1 Installation Requirements Terminal application software installation needs to be clearly authorized, the installation process can only run in a specific environment and can not undermine its operating environment. Specific technical requirements are as follows.