|
US$359.00 · In stock Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 34975-2017: Information security technology -- Security technical requirements and testing and evaluation approaches for application software of smart mobile terminals Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 34975-2017 | English | 359 |
Add to Cart
|
4 days [Need to translate]
|
Information security technology -- Security technical requirements and testing and evaluation approaches for application software of smart mobile terminals
| Valid |
GB/T 34975-2017
|
PDF similar to GB/T 34975-2017
Basic data | Standard ID | GB/T 34975-2017 (GB/T34975-2017) | | Description (Translated English) | Information security technology -- Security technical requirements and testing and evaluation approaches for application software of smart mobile terminals | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L80 | | Classification of International Standard | 35.040 | | Word Count Estimation | 18,191 | | Date of Issue | 2017-11-01 | | Date of Implementation | 2018-05-01 | | Regulation (derived from) | National Standard Announcement 2017 No. 29 | | Issuing agency(ies) | General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China |
GB/T 34975-2017: Information security technology -- Security technical requirements and testing and evaluation approaches for application software of smart mobile terminals ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology-Security technical requirements and testing and evaluation approaches for application software of smart mobile terminals
ICS 35.040
L80
National Standards of People's Republic of China
Information Security Technology Mobile Intelligent Terminal Application Software
Safety technical requirements and test evaluation methods
Posted.2017-11-01
2018-05-01 implementation
General Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China
China National Standardization Administration released
Directory
Preface Ⅰ
1 Scope 1
2 Normative references 1
3 Terms and definitions 1
4 safety technical requirements
4.1 safety function requirements
4.2 security requirements 4
5 test evaluation method 6
5.1 Safety Requirements Test 6
5.2 Security Requirements Testing 11
Foreword
This standard was drafted in accordance with the rules given in GB/T 1.1-2009.
This standard by the National Information Security Standardization Technical Committee (SAC/TC260) and focal point.
This standard was drafted unit. Third Ministry of Public Security Institute (Ministry of Public Security Computer Information System Product Quality Supervision and Inspection Center), Hangzhou,
Constant Information Technology Co., Ltd., East China Normal University, China Electronics Standardization Institute, China Information Security Institute Co., Ltd., China
Information and Communication Research Institute, China Mobile Communications Corporation, East China University of Technology, National Information Center.
The main drafters of this standard. Yu You, Zhang Yan, Lu Zhen, He Dao Jing, Tang Di, Gu Jian, Shen Liang, Yang Yuan Yuan, Chen Yan, Yang Chen, Xu Yu-
Sun Xiaoping, Lin Jiajun, Yang Zhengjun, Pan Juan, Qiu Qin, Yuan Jie, Zhang Heng.
Information Security Technology Mobile Intelligent Terminal Application Software
Safety technical requirements and test evaluation methods
1 Scope
This standard specifies the mobile intelligent terminal application software security technology requirements and test evaluation methods.
This standard applies to mobile intelligent terminal application software development, operation and maintenance of the life cycle of the process of security protection and test evaluation,
Not suitable for mobile intelligent terminal malware evaluation.
2 Normative references
The following documents for the application of this document is essential. For dated references, only the dated version applies to this article
Pieces. For undated references, the latest edition (including all amendments) applies to this document.
GB/T 18336.3-2015 Information Technology Security Technology Information Technology Security Assessment Guidelines Part 3. Security components
Information technology - Security terminology
3 Terms and definitions
GB/T 18336.3-2015 and GB/T 25069-2010 defined by the following terms and definitions apply to this document.
3.1
Mobile smart terminal smartmobileterminal
Access to the public mobile communication network, with an operating system, users can install and uninstall the application software mobile communication terminal products.
3.2
Mobile smart terminal operating system operatingsystemofsmartmobileterminal
The most basic system software of mobile intelligent terminal is used to control and manage various hardware and software resources of mobile intelligent terminal and provide application
Program development interface.
3.3
Mobile intelligent terminal applications applicationsoftwareofsmartmobileterminal
Applications developed for mobile smart terminals include third-party applications pre-installed on mobile smart terminals, as well as internet information services
Service providers can download, install and upgrade applications through mobile application distribution platforms such as websites and application stores.
4 safety technical requirements
4.1 safety function requirements
4.1.1 installation and unloading safety
4.1.1.1 Installation Requirements
Terminal application software installation needs to be clearly authorized, the installation process can only run in a specific environment and can not undermine its operating environment.
Specific technical requirements are as follows.
|