|
US$199.00 ยท In stock Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 36631-2018: Information security technology -- Time stamp policy and time stamp practice rules Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 36631-2018 | English | 199 |
Add to Cart
|
3 days [Need to translate]
|
Information security technology -- Time stamp policy and time stamp practice rules
| Valid |
GB/T 36631-2018
|
PDF similar to GB/T 36631-2018
Basic data | Standard ID | GB/T 36631-2018 (GB/T36631-2018) | | Description (Translated English) | Information security technology -- Time stamp policy and time stamp practice rules | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L80 | | Classification of International Standard | 35.040 | | Word Count Estimation | 10,143 | | Date of Issue | 2018-09-17 | | Date of Implementation | 2019-04-01 | | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 36631-2018: Information security technology -- Time stamp policy and time stamp practice rules ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
(Information Security Technology Time Stamp Policy and Time Stamp Business Operation Rules)
ICS 35.040
L80
National Standards of People's Republic of China
Information security technology
Timestamp policy and timestamp business operation rules
Published on.2018-09-17
Implementation of.2019-04-01
State market supervision and administration
China National Standardization Administration issued
Content
Foreword I
Introduction II
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 Abbreviations 2
5 timestamp strategy 2
5.1 Overview 2
5.2 Timestamp Policy ID 2
5.3 Application Entity 3
5.4 Applicability 3
5.5 Compliance 3
6 timestamp business operation rules 3
6.1 Business entity 3
6.2 Policy Management 3
6.3 Time Stamp Management 3
6.4 Time Synchronization Management 4
6.5 Key Information 4
6.6 Organization Certificate Generation Method 4
6.7 Backup Mechanism 4
6.8 Business Continuity 4
6.9 Operation Management 4
7 Responsibilities and obligations 4
7.1 Responsibility 4
7.2 Obligation 5
Reference 6
Foreword
This standard was drafted in accordance with the rules given in GB/T 1.1-2009.
Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents.
This standard is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260).
This standard was drafted. China Electronics Technology Standardization Research Institute, China Information Security Research Institute Co., Ltd., Chinese Academy of Sciences Software Research
Research Institute, Chongqing University of Posts and Telecommunications, National Time Service Center of Chinese Academy of Sciences, Beijing Digital Certification Co., Ltd., Beijing United Trust Technology Service
Limited company, Beijing University of Science and Technology, East China Normal University, National Information Security Engineering Technology Research Center, Changchun Jida Zhengyuan Information Technology Co., Ltd.
Company, Beijing Tianwei Chengxin E-Commerce Service Co., Ltd., Beijing Ruian Technology Co., Ltd., Beijing University of Aeronautics and Astronautics, Xi'an Electronics
Technical University, Henan University of Science and Technology, Communication University of China, China Ping An Insurance (Group) Co., Ltd., Beijing University of Technology, Beijing Post and Telecommunications University
Xue, Beijing Zhongdian Puhua Information Technology Co., Ltd., Anhui Science and Technology College.
The main drafters of this standard. Wang Huili, Yang Chen, Zhang Liwu, Huang Yonghong, Fan Kefeng, Guo Wei, Zhan Banghua, Zhang Changli, Ning Huansheng, Liu Hong,
He Daojing, Yuan Feng, Zhao Lili, Ma Wenping, Yan Qingyi, Chen Xiaofeng, Yang Li, Wu Qianhong, Xu Dongyang, Li Lin, Qi Chunfei, Yang Zhen, Cao Hao, Ma Zhanyu,
Cao Zhanfeng, Wan Yue, Mao Jian, Jiang Zhengtao, Zhang Zhiyong, Cai Wei.
Introduction
With the development of information technology, more and more traditional applications have been replaced by network applications, such as e-commerce, digital publishing and other network applications.
The traditional method of recording time has not been used in the Internet environment to prove whether time has occurred at a certain moment, when it is triggered to a trusted third party.
The need for a poke service. To this end, a number of domestic certification bodies and professional companies have successively launched time-related business services for electronic
Forensic, copyright protection, e-commerce and other services provide authoritative, reliable, and fair third-party time stamp services. In.2003, "Electronics
The issuance of the Signature Law provides legal protection for the further development of time-stamped business services.
To standardize the development of timestamp services, this standard is for third-party timestamp service organizations, in timestamp policies, timestamp business operation rules.
It should be standardized such as the timestamp identifier, timestamp management, and the responsibility and obligation of the timestamp associated party. This standard is in the process of formulation
In reference to the relevant norms at home and abroad, combined with the characteristics of China's time stamp service and application, it has been adjusted and expanded.
Information security technology
Timestamp policy and timestamp business operation rules
1 Scope
This standard specifies time stamping strategies, time stamping business operating rules, and responsibilities and obligations.
This standard applies to timestamp agencies to prepare timestamp strategies and timestamp business operation rules and other activities.
2 Normative references
The following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article.
Pieces. For undated references, the latest edition (including all amendments) applies to this document.
GB/T 16262.1-2006 Information technology abstract grammar notation - (ASN.1) Part 1. Basic notation specification
GB/T 20520-2006 Information Security Technology Public Key Infrastructure Time Stamp Specification
3 Terms and definitions
The following terms and definitions as defined in GB/T 20520-2006 apply to this document. For ease of use, the following is repeated
Some terms and definitions in GB/T 20520-2006.
3.1
Timestamp policy timestamppolicy
A set of specified rule sets that indicate the timestamp's suitability for a particular group and/or application type with the same security requirements.
3.2
Timestamp business operation rule timestamppractice
The timestamp mechanism is used by subscribers and relying parties in the process of issuing, managing, deleting and destroying timestamps and TSU key management.
Business practice.
3.3
Relying party relyingparty
Timestamp receiver.
3.4
Subscriber subscriber
An entity that requires a timestamp service by a timestamp mechanism.
3.5
Timestamp mechanism timestampauthority
The authority used to generate and manage timestamps.
[GB/T 20520-2006, definition 3.3]
3.6
Timestamp service timestampservice
A timestamp service provided by a timestamp organization to a subscriber.
Note. The file is timed by the subscriber and the time stamp authority issues a time stamp for this file.
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 36631-2018_English be delivered?Answer: Upon your order, we will start to translate GB/T 36631-2018_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 36631-2018_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 36631-2018_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|