HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (19 Oct 2025)

GB/T 36633-2018 English PDF

US$519.00 ยท In stock
Delivery: <= 5 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 36633-2018: Information security technology -- Technical guide for identity authentication over network
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 36633-2018English519 Add to Cart 5 days [Need to translate] Information security technology -- Technical guide for identity authentication over network Valid GB/T 36633-2018

PDF similar to GB/T 36633-2018


Standard similar to GB/T 36633-2018

GB/T 36627   GB/T 36624   GB/T 36630.1   GB/T 36630.4   GB/T 36630.3   

Basic data

Standard ID GB/T 36633-2018 (GB/T36633-2018)
Description (Translated English) Information security technology -- Technical guide for identity authentication over network
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.040
Word Count Estimation 26,20
Date of Issue 2018-09-17
Date of Implementation 2019-04-01
Issuing agency(ies) State Administration for Market Regulation, China National Standardization Administration

GB/T 36633-2018: Information security technology -- Technical guide for identity authentication over network


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology - Technical guide for identity authentication over network ICS 35.040 L80 National Standards of People's Republic of China Information security technology Network User Identity Identification Technical Guide Published on.2018-09-17 Implementation of.2019-04-01 State market supervision and administration China National Standardization Administration issued

Content

Foreword III 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 2 5 Overview 2 5.1 Network User Identity Identification Process 2 5.2 Authentication Protocol 4 5.3 Credentials 4 5.4 Verifier 4 5.5 relying party 5 5.6 Password Support 5 6 User registration and certificate issuance process 5 6.1 Registering and Distributing Threats 5 6.2 Coping strategies for registering and distributing threats 6 7 Identification information submission and verification process 7 7.1 Submitting and verifying threats 7 7.2 Coping strategies for submitting and verifying threats 8 8 assertion process 9 8.1 Assertion threat 9 8.2 Strategies for asserting threats 10 9 Document 11 9.1 Type of Document 11 9.2 Credential Threat 12 9.3 Coping strategies for voucher threats 13 10 Certificate Management 14 10.1 Voucher Management Activities 14 10.2 Credential Management Threats 15 10.3 Coping Strategies for Credential Management Threats 15 Appendix A (informative appendix) Identification process of three identification models 17 Appendix B (informative) Basic Assertion Model 19

Foreword

This standard was drafted in accordance with the rules given in GB/T 1.1-2009. Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents. This standard is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This standard was drafted. The Third Institute of the Ministry of Public Security, China Electronics Technology Standardization Institute, Xi'an Xidian Jietong Wireless Network Communication Unit Co., Ltd., Beijing University of Technology, Wuhan University. The main drafters of this standard. Gu Jian, Zhang Xiaoxiao, Yang Yuanyuan, Chen Yu, Fan Kefeng, Gu Yu, Yu You, Shen Liang, Wang Yingying, Shen Qingyi, Xu Dongyang, Du Zhiqiang, Li Qin, Yang Zhen, Wang Lina. Information security technology Network User Identity Identification Technical Guide

1 Scope

This standard gives the main process of user identity identification in the network environment and the threat of common authentication technology, and stipulates the defense against The method of threatening. This standard applies to the design, development and testing of user identity authentication systems in a network environment.

2 Normative references

The following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article. Pieces. For undated references, the latest edition (including all amendments) applies to this document. GB/T 15843.1 Information technology security technology entity identification Part 1. General GB/T 15843.2 Information technology security technology entity identification Part 2. Mechanisms using symmetric cryptographic algorithms GB/T 15843.3 Information technology security technology entity identification Part 3. Mechanisms using digital signature technology GB/T 15843.4 Information technology security technology entity identification Part 4. Mechanisms using cryptographic check function GB/T 15843.5 Information technology security technology entity identification Part 5. Mechanisms using zero-knowledge technology GB/T 25069 Information Security Technical Terminology GB/T 28455 Information Security Technology Introduces Entity Authentication and Access Architecture Specification for Trusted Third Parties

3 Terms and definitions

The following terms and definitions as defined in GB/T 25069 apply to this document. 3.1 Claiming party For identification, it is itself an ontology or an individual representing the ontology. Note. The claimant has various functions that represent the ontology for authentication exchange. 3.2 Applicant applicant An individual requesting the assignment of a registration item and its label. 3.3 Verifier verifier An institution or organization that verifies the legality of a party. 3.4 Relying party relyingparty An organization or organization that relies on the identity authentication result to determine whether to establish a trust relationship with the claimant. 3.5 Credential credential personal I.D.

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 36633-2018_English be delivered?

Answer: Upon your order, we will start to translate GB/T 36633-2018_English as soon as possible, and keep you informed of the progress. The lead time is typically 3 ~ 5 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 36633-2018_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 36633-2018_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.