GB/T 37985-2019 PDF English
US$130.00 · In stock · Download in 9 secondsGB/T 37985-2019: Technical Requirements for Key Management System for the Electronic Identification of Motor Vehicles Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
| GB/T 37985-2019 | English | 130 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
Technical Requirements for Key Management System for the Electronic Identification of Motor Vehicles
| Valid |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GB/T 37985-2019
GB/T 37985-2019: Technical Requirements for Key Management System for the Electronic Identification of Motor Vehicles ---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT37985-2019
NATIONAL STANDARD OF THE
PEOPLE’S REPUBLIC OF CHINA
ICS 35.040
L 80
Technical Requirements for Key Management System
for the Electronic Identification of Motor Vehicles
ISSUED ON: AUGUST 30, 2019
IMPLEMENTED ON: MARCH 1, 2020
Issued by: State Administration for Market Regulation;
Standardization Administration of the People’s Republic of
China.
Table of Contents
Foreword ... 3
1 Scope ... 4
2 Normative References ... 4
3 Terms and Definitions ... 4
4 Abbreviations ... 5
5 General Requirements ... 5
6 Key Management and Basic Functions ... 6
Appendix A (Normative) Classification of Symmetric Key ... 11
Appendix B (Normative) Classification of Asymmetric Key ... 12
Technical Requirements for Key Management System
for the Electronic Identification of Motor Vehicles
1 Scope
This Standard stipulates the general requirements, key management and basic
functions of key management system for the electronic identification of motor vehicles.
This Standard is applicable to the development, testing, construction and application
of key management system for the electronic identification of motor vehicles.
2 Normative References
The following documents are indispensable to the application of this document. In
terms of references with a specified date, only versions with a specified date are
applicable to this document. In terms of references without a specified date, the latest
version (including all the modifications) is applicable to this document.
GB/T 22239-2008 Information Security Technology - Baseline for Classified Protection
of Information System Security;
GB/T 35789.1-2017 General Specification for the Electronic Identification of Motor
Vehicles - Part 1: Automobile;
GM/T 0002 SM4 Block Cipher Algorithm;
GM/T 0035.5-2014 Specifications of Cryptographic Application for RFID Systems -
Part 5: Specification for Key Management
3 Terms and Definitions
What is defined in GB/T 35789.1-2017, and the following terms and definitions are
applicable to this document.
3.1 Key Management System for the Electronic Identification of Motor
Vehicles
Key management system for the electronic identification of motor vehicles refers to an
information system, which implements management of various keys of the electronic
identification and read-write equipment of motor vehicles.
3.2 Original Derivation Key
a) Be operated in public security’s information communication network;
b) Cryptographic machine shall adopt commercial cryptographic products
authorized by national cipher management department.
6 Key Management and Basic Functions
6.1 Key Management
6.1.1 Management procedure
The procedure of key management: generation, dispersion, injection, distribution,
storage, backup, verification, update, archiving and destruction shall comply with the
requirements in GM/T 0035.5-2014.
6.1.2 Key system
6.1.2.1 Key management system for the electronic identification of motor vehicles
adopts two types of key system, namely, symmetric and asymmetric.
6.1.2.2 Symmetric key is applied to the identity authentication, access control,
confidentiality and integrity protection between read-write equipment and the electronic
identification of motor vehicles.
6.1.2.3 Asymmetric key is mainly applied to identity authentication, access control,
non-repudiation, confidentiality and integrity protection among cryptographic machine,
read-write equipment and back-end server.
6.1.3 Symmetric key
6.1.3.1 Key management and classification
The management of symmetric key shall comply with the requirements in 5.1 in GM/T
0035.5-2014. The classification of symmetric key is shown in Table A.1 in Appendix A.
6.1.3.2 Key generation
Original derivation key shall be generated by the central key management system
through cryptographic machine. The generation process shall record audit information.
6.1.3.3 Key dispersion
Key dispersion shall comply with the following requirements:
a) Data encryption derivation key of motor vehicle registration information area
which is injected into the sub-central key management system is generated
through the dispersion of original derivation key. Dispersion factor shall be key
category code;
Key distribution process between the central and sub-central key management system
shall comply with the following requirements:
a) In the export and import operation of key, cryptographic machine has a security
protection mechanism;
b) Encrypt the key; transmit it in the mode of ciphertext.
6.1.3.6 Key storage
Key storage shall comply with the following requirements:
a) All the derivation keys in the key management system are stored in
cryptographic machine;
b) All the keys in read-write equipment are stored in security module; they cannot
be exported;
c) Keys in the electronic identification of motor vehicles are stored in security zone
and password-specific storage area of electronic identification of motor vehicles;
they cannot be exported.
6.1.3.7 Key backup
Keys in the key management system of the electronic identification of motor vehicles
shall comply with the following requirements:
a) Encrypt keys to be backed up; backup then in mediums like disk and intelligent
IC card;
b) Separate key backup into multiple parts, which shall be respectively stored by
different personnel;
c) Keys used for encryption key backup are stored in mediums like intelligent IC
card and intelligent password key. They are also separated into multiple parts,
which are respectively stored by different personnel.
6.1.3.8 Key verification
The integrity of keys and backup keys stored in the key management system of the
electronic identification of motor vehicles shall be regularly verified.
6.1.3.9 Key update, archiving and destruction
Key update, archiving and destruction of the key management system of the electronic
identification of motor vehicles shall comply with the following requirements:
a) It shall be able to support and manage multiple versions of original derivation
key;
partitional write password, etc.; write into the security module of the read-write
equipment.
f) Initialization of electronic identification of motor vehicles. Adopt the dispersion of
original derivation keys to generate keys, such as: identity authentication,
inactivation password, locking password, partitional read password and
partitional write password, etc.; inject into the electronic identification of motor
vehicles.
g) Cryptographic machine management, including switch between main
cryptographic machine and backup cryptographic machine, work status query
and cryptographic machine network settings, etc.
h) System user management, including adding new users, deleting users and
setting users’ operating permission, etc.
i) System log management, including log query, log backup and abnormal
operating alarm, etc.
j) Remote supervision, including supervision of the operating status of the sub-
central key management system.
6.2.2 Sub-central key management system
Sub-central key management system shall be equipped with the following functions:
a) Key management, including key backup, verification, update and destruction,
etc.
b) Secure key import, including secure important of derivation keys, such as:
identity authentication, inactivation password, locking password, partitional
read password, partitional write password and partitional data encryption.
c) Data encryption and decryption service, including encryption and decryption
service of data in the user area of the electronic identification of motor vehicles.
d) Cryptographic machine management, including switch between main
cryptographic machine and backup cryptographic machine, work status query
and cryptographic machine network settings, etc.
e) System user management, including adding new users, deleting users and
setting users’ operating permission, etc.
f) System log management, including log query, log backup and abnormal
operating alarm, etc.
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of GB/T 37985-2019 be delivered?Answer: The full copy PDF of English version of GB/T 37985-2019 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of GB/T 37985-2019_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 37985-2019_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GB/T 37985-2019 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.
How to buy and download a true PDF of English version of GB/T 37985-2019?A step-by-step guide to download PDF of GB/T 37985-2019_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD). Step 2: Search keyword "GB/T 37985-2019". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9
|