|
US$199.00 ยท In stock Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 36629.1-2018: Information security technology -- Security technique requirements for citizen cyber electronic identity -- Part 1: Security technique requirements for reader Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 36629.1-2018 | English | 199 |
Add to Cart
|
3 days [Need to translate]
|
Information security technology -- Security technique requirements for citizen cyber electronic identity -- Part 1: Security technique requirements for reader
| Valid |
GB/T 36629.1-2018
|
PDF similar to GB/T 36629.1-2018
Basic data | Standard ID | GB/T 36629.1-2018 (GB/T36629.1-2018) | | Description (Translated English) | Information security technology -- Security technique requirements for citizen cyber electronic identity -- Part 1: Security technique requirements for reader | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L80 | | Classification of International Standard | 35.040 | | Word Count Estimation | 10,131 | | Date of Issue | 2018-10-10 | | Date of Implementation | 2019-05-01 | | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 36629.1-2018: Information security technology -- Security technique requirements for citizen cyber electronic identity -- Part 1: Security technique requirements for reader ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
(Information technology - Citizens network - Electronic identification - Part 1 - Part 1)
ICS 35.040
L80
National Standards of People's Republic of China
Information security technology
Citizen Network Electronic Identity Identification Security Technical Requirements
Part 1. Safety requirements for reading and writing implements
Part 1. Securitytechniquerequirementsforreader
Published on.2018-10-10
2019-05-01 implementation
State market supervision and administration
China National Standardization Administration issued
Content
Foreword I
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 Abbreviations 2
5 basic safety requirements for reading and writing equipment 2
5.1 Basic Components 2
5.2 Micro Control Unit 3
5.3 Security Module 3
5.4 Security Module Interface 3
6 read and write equipment data initialization requirements 3
6.1 Reading and writing machine identification data 3
6.2 Code for reading and writing machine identification 3
6.3 Read and write machine digital certificate format 4
6.4 Read and write machine certificate issuance system certificate format 4
7 literacy tool password management security requirements 4
7.1 Cryptographic Algorithm 4
7.2 Key Management 5
7.3 Certificate Management 5
7.4 Read and write machine boot password management 5
8 literacy tool password application service security requirements 5
8.1 Data encryption and decryption service 5
8.2 Signature PIN Service 5
8.3 Digital Signature Service 5
Reference 6
Foreword
GB/T 36629 "Information Security Technology Citizen Network Electronic Identity Identification Security Technical Requirements" is divided into the following sections.
--- Part 1. Safety requirements for reading and writing equipment;
--- Part 2. Carrier security technical requirements;
--- Part 3. Verify service messages and their processing rules.
This part is the first part of GB/T 36629.
This part is drafted in accordance with the rules given in GB/T 1.1-2009.
Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents.
This part is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260).
This section drafted by. Ministry of Public Security Third Institute, Institute of Software, Chinese Academy of Sciences, National University of Defense Technology, Chinese Academy of Sciences information
Engineering Research Institute, National Information Center, Beijing Digital Certification Co., Ltd., Shanghai Geer Software Co., Ltd., Puhua Integrity Information Technology
Technology Co., Ltd., Jinlian Huitong Information Technology Co., Ltd.
The main drafters of this section. Hu Chuanping, Zou Xiang, Chen Bing, Yang Minghui, Jia Yan, Zhang Liwu, Liu Limin, Li Xinyou, Guo Qiang, Zhang Wei, Fu Dapeng,
Zhang Wei, Liang Zuoquan, Xie Chao, Tian Wenjin, Zheng Qiang, Liu Hailong, Ni Lizhen, Yan Yixin, Xia Lijuan, Zhou Bin, Zhang Yan.
Information security technology
Citizen Network Electronic Identity Identification Security Technical Requirements
Part 1. Safety requirements for reading and writing implements
1 Scope
This part of GB/T 36629 stipulates the basic security requirements and data initialization security of the citizen network electronic identity identification reading and writing machine.
Requirements, password application management security requirements and password application service security requirements.
This section applies to the design, development, testing, production and application of citizen network electronic identity identification reading and writing equipment.
2 Normative references
The following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article.
Pieces. For undated references, the latest edition (including all amendments) applies to this document.
GB/T 16649.3-2006 Integrated circuit cards with identification contacts - Part 3. Electrical signals and transmission protocols
GB/T 20518-2018 Information Security Technology Public Key Infrastructure Digital Certificate Format
GB/T 32905-2016 Information Security Technology SM3 Password Hash Algorithm
GB/T 32907-2016 Information Security Technology SM4 Block Cipher Algorithm
GB/T 32915-2016 Information security technology binary sequence randomness detection method
GB/T 32918.2-2016 Information security technology SM2 elliptic curve public key cryptographic algorithm Part 2. Digital signature algorithm
GB/T 32918.4-2016 Information security technology - SM2 elliptic curve public key cryptographic algorithm - Part 4
GB/T 36632-2018 Information Security Technology Citizen Network Electronic Identity Format Specification
ISO /IEC 14443.4.2016 Identification card contactless integrated circuit card proximity card Part 4. Transmission protocol (Identifi-
cationcards-Contactlessintegratedcircuitcards-Proximitycards-Part 4.Transmissionprotocol)
3 Terms and definitions
The following terms and definitions as defined in GB/T 36632-2018 apply to this document.
3.1
Read and write machine reader
The utility model can read and write the information related to the electronic identity of the citizen network carried in the carrier such as the smart card and the smart cipher key.
3.2
Read and write machine security module secureelementofreader
The core hardware circuit security component inside the reader.
3.3
Read and write machine digital certificate certificateofreader
A digital certificate used to identify the identity of the reader.
3.4
Password application management cryptographicapplicationmanagement
Used to generate, store, import, export, and update keys on the read/write implement security module, and digitally certificate the reader
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 36629.1-2018_English be delivered?Answer: Upon your order, we will start to translate GB/T 36629.1-2018_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 36629.1-2018_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 36629.1-2018_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|