US$1559.00 ยท In stock Delivery: <= 9 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 43694-2024: Cybersecurity technology - Certificate application integrated service interface specification Status: Valid
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
GB/T 43694-2024 | English | 1559 |
Add to Cart
|
9 days [Need to translate]
|
Cybersecurity technology - Certificate application integrated service interface specification
| Valid |
GB/T 43694-2024
|
PDF similar to GB/T 43694-2024
Basic data Standard ID | GB/T 43694-2024 (GB/T43694-2024) | Description (Translated English) | Cybersecurity technology - Certificate application integrated service interface specification | Sector / Industry | National Standard (Recommended) | Classification of Chinese Standard | L80 | Classification of International Standard | 35.030 | Word Count Estimation | 78,756 | Date of Issue | 2024-04-25 | Date of Implementation | 2024-11-01 | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 43694-2024: Cybersecurity technology - Certificate application integrated service interface specification ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35:030
CCSL80
National Standards of People's Republic of China
Network Security Technology Certificate Application Comprehensive Service Interface Specification
Released on 2024-04-25
2024-11-01 Implementation
State Administration for Market Regulation
The National Standardization Administration issued
Table of Contents
Preface I
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 Abbreviations 2
5 Certificate application comprehensive service interface 2
5:1 The position of the certificate application comprehensive service interface in the public key cryptography application technology system framework 2
5:2 Classification of certificate application comprehensive service interface 2
5:3 Client Service Interface 2
5:4 Server Service Interface 2
6 Identification and Data Structure 3
6:1 Definition of logo 3
6:2 Data structure definition 3
6:3 Data format requirements 3
7 Certificate Application Comprehensive Service Interface Definition 3
7:1 Client COM component interface 3
7:2 Client JavaScript Scripting Interface 16
7:3 Server-side COM component interface 28
7:4 Server-side Java component interface 42
8 Interface Verification Methods 56
8:1 Verification Environment 56
8:2 Verification Principles 56
8:3 Verification Scenario 57
Appendix A (Normative) Certificate Application Integrated Service Interface Error Code Definition 61
Appendix B (Informative) Typical deployment model of certificate application integrated service interface 64
Appendix C (Informative) Certificate Application Comprehensive Service Interface Integration Example 65
Appendix D (Informative) Summary of Certificate Application Comprehensive Service Interface 67
Appendix E (Informative) Client JavaScript script interface asynchronous call example description 73
References 74
Foreword
This document is in accordance with the provisions of GB/T 1:1-2020 "Guidelines for standardization work Part 1: Structure and drafting rules for standardization documents"
Drafting:
Please note that some of the contents of this document may involve patents: The issuing organization of this document does not assume the responsibility for identifying patents:
This document was proposed and coordinated by the National Cybersecurity Standardization Technical Committee (SAC/TC260):
This document was drafted by: Beijing Digital Certification Co:, Ltd:, Boya Zhongke (Beijing) Information Technology Co:, Ltd:, Beijing Qihoo Technology
Co:, Ltd:, Shandong De'an Information Technology Co:, Ltd:, China Electric Power Research Institute, Beijing Xin'an Century Technology Co:, Ltd:, Wuxi Jiang
South China Information Security Engineering Technology Center, China Electronics Technology Standardization Institute, Geer Software Co:, Ltd:, China Electronics Technology Network Security Technology
Co:, Ltd:, Shenzhen Real Estate Registration Center, Zhengzhou Xindajiean Information Technology Co:, Ltd:, Alibaba Cloud Computing Co:, Ltd:, Zhejiang
Jiang Jiuzhou Quantum Information Technology Co:, Ltd:, Aerospace Information Co:, Ltd:, Digital Security Times Technology Co:, Ltd:, Zhixun Password (Shanghai)
Hai) Testing Technology Co:, Ltd:, China Science and Technology Information Security Common Technology National Engineering Research Center Co:, Ltd:, China Automotive Engineering Research Institute Co:, Ltd:
Ltd:
The main drafters of this document are: Liu Wei, Zhao Yongsheng, Xia Luning, Li Shusheng, Liu Zhong, Cheng Kewei, Pu Yusan, Zhang Yi, Zhang Zhilei, Ma Hongfu,
Yuan Zhonglin, Li Zhihu, Jiao Jingwei, Liu Ping, Huang Jingjing, Tan Wuzheng, Kou Jianbo, Yan Hailong, Liu Xianlun, Liu Weihua, Xiao Shuting, Zhang Wenke,
Yang Qianmei, Dong Liangliang, Zhou Weilin, Han Wei, Gao Zhenpeng, Hu Jianxun, Liu Chong, and Mou Jie:
Network Security Technology Certificate Application Comprehensive Service Interface Specification
1 Scope
This document specifies the requirements and definitions of the comprehensive service interface for certificate applications and describes the corresponding verification methods:
This document is applicable to the development of certificate application middleware and certificate application system under the public key cryptography infrastructure application technology system, as well as the development of certificate application middleware and certificate application system under the public key cryptography infrastructure application technology system:
Development and testing of code application support platform:
2 Normative references
The contents of the following documents constitute the essential clauses of this document through normative references in this document:
For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to
This document:
GB/T 20518 Information security technology Public key infrastructure Digital certificate format
GB/T 25061 Information security technology XML digital signature syntax and processing specification
GB/T 25069 Information security technical terms
GB/T 33560 Information security technology cryptographic application identification specification
GB/T 35275 Information security technology SM2 cryptographic algorithm encryption signature message syntax specification
GB/T 35276 Information security technology SM2 cryptographic algorithm usage specification
GB/T 35291 Information security technology Intelligent password key application interface specification
GB/T 36322 Information security technology cryptographic equipment application interface specification
GB/T 43578 Information security technology general cryptographic service interface specification
GM/T 0094-2020 Public Key Cryptography Application Technology System Framework Specification
GM/Z4001 Cryptographic Terminology
3 Terms and definitions
The terms and definitions defined in GB/T 25069, GM/Z4001 and the following apply to this document:
3:1
digital certificatedigitalcertificate
A data signed by a CA that contains information about the public key owner, public key, issuer, validity period, and extended information:
structure:
Note: Digital certificates are also called public key certificates: They are divided into personal certificates, institutional certificates, and device certificates by category, and into signature certificates and encryption certificates by purpose:
[Source: GM/Z4001-2013, 2:115]
3:2
User key userkey
An asymmetric key pair stored inside the device and used for application cryptographic operations:
Note: User keys include a signature key pair and an encryption key pair:
3:3
keycontainer
A unique storage space in a cryptographic device used to store user keys:
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 43694-2024_English be delivered?Answer: Upon your order, we will start to translate GB/T 43694-2024_English as soon as possible, and keep you informed of the progress. The lead time is typically 6 ~ 9 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 43694-2024_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 43694-2024_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|