GB/T 38638-2020 PDF English
US$145.00 · In stock · Download in 9 secondsGB/T 38638-2020: Information security technology - Trusted computing - Architecture of trusted computing Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
| GB/T 38638-2020 | English | 145 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
Information security technology - Trusted computing - Architecture of trusted computing
| Valid |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GB/T 38638-2020
GB/T 38638-2020: Information security technology - Trusted computing - Architecture of trusted computing ---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT38638-2020
GB
NATIONAL STANDARD OF THE
PEOPLE’S REPUBLIC OF CHINA
ICS 35.040
L 80
Information security technology - Trusted computing -
Architecture of trusted computing
可信计算体系结构
ISSUED ON: APRIL 28, 2020
IMPLEMENTED ON: NOVEMBER 01, 2020
Issued by: State Administration for Market Regulation;
Standardization Administration of the People's Republic of
China.
Table of Contents
Foreword ... 3
1 Scope ... 4
2 Normative references ... 4
3 Terms and definitions ... 5
4 Abbreviations ... 6
5 Architecture of trusted computing ... 6
6 Trusted components and integrity measurement modes ... 8
6.1 Trusted components ... 8
6.2 Integrity measurement modes ... 9
7 Types of trusted computing nodes ... 12
7.1 Trusted computing nodes (terminal) ... 12
7.2 Trusted computing nodes (services) ... 13
Information security technology - Trusted
computing - Architecture of trusted computing
1 Scope
This Standard specifies the architecture of trusted computing, trusted
components and integrity measurement modes, as well as types of trusted
computing nodes.
This Standard applies to the design, development and application of trusted
computing systems.
2 Normative references
The following referenced documents are indispensable for the application of
this document. For dated references, only the edition cited applies. For undated
references, the latest edition of the referenced document (including any
amendments) applies.
GB/T 29827-2013 Information security technology - Trusted computing
specification - Motherboard function and interface of trusted platform
GB/T 29828-2013 Information security technology - Trusted computing
specification - Trusted connect architecture
GB/T 29829-2013 Information security techniques - Functionality and
interface specification of cryptographic support platform for trusted
computing
GB/T 36639-2018 Information security technology - Trusted computing
specification - Trusted support platform for server
GB/T 37935-2019 Information security technology - Trusted computing
specification - Trusted software base
ISO/IEC 11889:2015 Information technology - Trusted platform module
library
A collection of software elements that support the trustworthiness of a trusted
computing platform.
[GB/T 37935-2019, definition 3.3]
3.6
trusted chain
The trust transfer relationship that is established between the components by
the integrity measurement method during the startup and operation of a
computing node.
[GB/T 29829-2013, definition 3.1.13]
4 Abbreviations
For the purpose of this document, the following abbreviations apply.
BIOS: Basic Input Output System
CRTM: Core Root of Trust for Measurement
TCM: Trusted Cryptography Module
TPCM: Trusted Platform Control Module
TPM: Trusted Platform Module
TSB: Trusted Software Base
TSM: TCM Service Module
TSS: TCG Software Stack
5 Architecture of trusted computing
Trusted computing refers to the safety protection while computing, and the
whole computing process can be measured and controlled without interference,
so that the computing results are always consistent with expectations. The
trusted computing system is composed of trusted computing nodes and trusted
connections between them, which provide corresponding levels of security for
the network environment in which they are located, as shown in Figure 1.
According to the functions of the nodes in the network environment, trusted
computing nodes can deploy applications with different functions according to
their business environment. Trusted computing nodes include trusted
independent module or physical package, or be realized by integration and
virtualization with TCM/TPM through IP core or firmware.
6.1.3 Trusted main board
Trusted main board is a computer main board integrated with TPCM, which
uses TPCM as a root of trust to establish a chain of trust and provides the
connection between TPCM and other hardware.
The composition structure and function interfaces of trusted main board shall
comply with GB/T 29827-2013.
6.1.4 Trusted software base
Trusted software base (TSB) implements monitoring and measurement of
applications running in the host basic software.
The composition structure and function interfaces of TSB shall comply with
GB/T 37935-2019.
6.1.5 Trusted connection
Trusted connection realizes the identity authentication and platform
authentication of trusted computing nodes when they access the network,
including user identity authentication, platform identity authentication, and
platform integrity assessment, ensuring that only trusted computing nodes can
access the network.
The specific structure and function interfaces of trusted connection shall comply
with GB/T 29828-2013.
6.2 Integrity measurement modes
6.2.1 Arbitration measurement mode
The arbitration measurement mode of trusted components is shown in Figure
3. The participating components shall include TCM/TPM, TPCM, trusted main
board and TSB.
At the hardware and firmware layer, TPCM shall be the first running component
of the trusted computing node. As the root of trust of the trusted computing node,
it shall apply TCM/TPM or other cryptographic algorithms and integrity
measurement functions to actively initiate integrity measurement operations on
computing components such as BIOS and host basic software, and actively
arbitrate and control based on the measurement results.
At the host basic software and middleware layer, TPCM provides support for
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of GB/T 38638-2020 be delivered?Answer: The full copy PDF of English version of GB/T 38638-2020 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of GB/T 38638-2020_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 38638-2020_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GB/T 38638-2020 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.
How to buy and download a true PDF of English version of GB/T 38638-2020?A step-by-step guide to download PDF of GB/T 38638-2020_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD). Step 2: Search keyword "GB/T 38638-2020". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9
|