|
US$239.00 · In stock Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 35592-2017: Security technology requirements for sensing terminals access to IoTPS Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 35592-2017 | English | 239 |
Add to Cart
|
3 days [Need to translate]
|
Security technology requirements for sensing terminals access to IoTPS
| Valid |
GB/T 35592-2017
|
PDF similar to GB/T 35592-2017
Basic data | Standard ID | GB/T 35592-2017 (GB/T35592-2017) | | Description (Translated English) | Security technology requirements for sensing terminals access to IoTPS | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | A90 | | Classification of International Standard | 35.020 | | Word Count Estimation | 12,146 | | Date of Issue | 2017-12-29 | | Date of Implementation | 2017-12-29 | | Quoted Standard | GB 17859-1999; GB/T 18794.2-2002; GB/T 20275; GB/T 20281; GB/T 25069-2010; GA/T 1266-2015 | | Regulation (derived from) | National Standards Announcement No. 32 of 2017 | | Issuing agency(ies) | General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China | | Summary | This standard specifies the security access methods and related security requirements for the sensor terminals to access the public security Internet of things. This standard applies to the construction and management of public security Internet of things. |
GB/T 35592-2017: Security technology requirements for sensing terminals access to IoTPS---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Security technology requirements for sensing terminals access to IoTPS
ICS 35.020
A90
National Standards of People's Republic of China
Public Security Internet of Things Perceived Terminal Access Security Technical Requirements
Published on.2017-12-29
2017-12-29 Implementation
General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China
China National Standardization Administration released
Directory
Preface III
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 Abbreviations 1
5 Perceived Terminal Access Overview 2
5.1 Overall Structure 2
5.2 Perceived Terminal Access Mode 2
6 Perceived Terminal Access and Channel Requirements 3
6.1 Perceived Terminal Direct Access Requirements 3
6.2 Perceived Terminal Indirect Access Requirements 4
7 Security Access System Requirements 5
7.1 Safety Equipment Requirements 5
7.2 Entity Access Authentication 6
7.3 Access Control 6
7.4 Data Transmission Security Requirements 6
7.5 Terminal or IoT Gateway Certificate Management Mechanism 6
7.6 Firewall Policy 6
7.7 Intrusion Detection and Antivirus Mechanisms 6
7.8 Reliability Requirements 7
Appendix A (informative) Appendix 8 examples of security access application networking security application structure
Reference 9
Foreword
This standard was drafted in accordance with the rules given in GB/T 1.1-2009.
Please note that some of the contents of this document may involve patents. The issuing agency of this document does not assume responsibility for identifying these patents.
This standard is proposed and managed by the Ministry of Public Security of the People's Republic of China.
This standard was drafted by the Third Institute of the Ministry of Public Security, the First Institute of the Ministry of Public Security, and the Ministry of Public Security’s safety supervision and alarm system quality supervision and inspection.
Test Center, Wuxi Institute of Internet of Things Industry, Ministry of Industry and Information Technology, Institute of Electronics Industry Standardization, Huawei Technologies Co., Ltd., Zhejiang Yu
Vision Technology Co., Ltd., Pok Hong Intelligent Network Technology Co., Ltd., Shanghai Chen Rui Information Technology Company, National Computer Network Emergency Technology
Deal with the coordination center.
The main drafters of this standard. Qi Li, Yang Ming, Zhu Xingguo, Tang Qiang, Tao Yuan, Li Haitao, Lu Hongbo, Zhang Yan, Li Xuan, Chen Shuyi, Gong Jiezhong,
Chen Jiaming, Shen Guohua, Liao Shuanglong, Zheng Wu, and Wang Hui.
Public Security Internet of Things Perceived Terminal Access Security Technical Requirements
1 Scope
This standard specifies the security access methods and related security requirements for the sensor terminals to access the public security Internet of things.
This standard applies to the construction and management of public security Internet of things.
2 Normative references
The following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article
Pieces. For undated references, the latest version (including all amendments) applies to this document.
GB 17859-1999 Guidelines for the classification of security levels for computer information systems
GB/T 18794.2-2002 Information technology Open Systems Interconnection Open Systems Security Framework Part 2. Authentication Framework
GB/T 20275 Information Security Technology Network Intrusion Detection System Technical Requirements and Test Evaluation Methods
GB/T 20281 Information Security Technology Firewall Security Technical Requirements and Test Evaluation Methods
GB/T 25069-2010 Information Security Technical Terms
GA/T 1266-2015 Public Security Internet of Things Terms
3 Terms and Definitions
GB 17859-1999, GB/T 18794.2-2002, GB/T 25069-2010 and GA/T 1266-2015 as defined and under
The column terms and definitions apply to this document.
3.1
Security Access System securityaccesssystemofcorenetwork
It is used to ensure the security of data communication between the sensing terminal and the public security Internet of Things, and it also serves as a security control for connection and application mapping.
facility.
3.2
IoT gateway sensinglayergateway
A network deployed at the boundary between the public perception network of the Internet of Things and the network layer to realize the communication between the Internet of Things perception terminal and the network layer communication network
Connect, control, and manage devices.
4 Abbreviations
The following abbreviations apply to this document.
ID. Identity number (Identity)
IoTPS. Internet of Things of Public Security (Internet of Things of Public Security)
IP. Internet Protocol (Internet Protocol)
RFID. RadioFrequency Identification
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 35592-2017_English be delivered?Answer: Upon your order, we will start to translate GB/T 35592-2017_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 35592-2017_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 35592-2017_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|