HOME Cart(0) Quotation About-Us Policies PDFs Standard-List
www.ChineseStandard.net Database: 221581 (27 Mar 2026)
Path: Home > GB/T > Page206 > GB/T 45674-2025 || Home > Standard_List > GB/T > Page206 > GB/T 45674-2025

GB/T 45674-2025 PDF English

Price & Delivery

US$459.00 · In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 45674-2025: Cybersecurity technology - Generative artificial intelligence data annotation security specification
Status: Valid
Std IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)Status
GB/T 45674-2025English459 Add to Cart 4 days [Need to translate] Cybersecurity technology - Generative artificial intelligence data annotation security specification Valid

Standard similar to GB/T 45674-2025

GB/T 43696 | GB/T 43779 | GB/T 42453 | GB/T 47020 | GB 45438 |

Basic data

Standard ID GB/T 45674-2025 (GB/T45674-2025)
Description (Translated English) Cybersecurity technology - Generative artificial intelligence data annotation security specification
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.030
Word Count Estimation 22,221
Date of Issue 2025-04-25
Date of Implementation 2025-11-01
Issuing agency(ies) State Administration for Market Regulation, China National Standardization Administration

GB/T 45674-2025: Cybersecurity technology - Generative artificial intelligence data annotation security specification


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35.030 CCSL80 National Standard of the People's Republic of China Cybersecurity Technology Generative AI Data Annotation Security Specification Released on 2025-04-25 2025-11-01 Implementation State Administration for Market Regulation The National Standardization Administration issued

Table of contents

Preface III Introduction IV 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Overview 2 5 Data annotation platform or tool security requirements 3 6 Data Labeling Rules Security Requirements 3 7 Data Labeling Personnel Requirements 4 7.1 Safety Training 4 7.2 Task Assignment 4 7.3 Personnel Management 4 8 Data Labeling Verification Requirements 5 8.1 Basic Requirements 5 8.2 Functional labeling verification safety requirements 5 8.3 Safety labeling and verification of safety requirements 6 9 Data Annotation Security Evaluation Method 6 9.1 Data Annotation Platform or Tool Security Requirements Evaluation Method 6 9.2 Data Annotation Rules Security Requirements Evaluation Method 7 9.3 Data Labeling Personnel Requirements Evaluation Method 8 9.4 Evaluation Methods for Data Annotation Verification Requirements 10 Appendix A (Informative) Generative AI Data Annotation Examples 12 Appendix B (Informative) Examples of AI Labeling Task Types14

Foreword

This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents" Drafting. Please note that some of the contents of this document may involve patents. The issuing organization of this document does not assume the responsibility for identifying patents. This document was proposed and coordinated by the National Cybersecurity Standardization Technical Committee (SAC/TC260). This document was drafted by. National Computer Network Emergency Response Technical Coordination Center, China Electronics Technology Standardization Institute, Beijing Zhongguancun Village Laboratory, Beijing Kuaishou Technology Co., Ltd., Beijing Baidu Netcom Technology Co., Ltd., Beijing Topsec Network Security Technology Co., Ltd., Alibaba Cloud Computing Co., Ltd., Peking University, Jiangsu Branch of the National Computer Network Emergency Response Technical Processing Coordination Center, and the Third Research Institute of the Ministry of Public Security Institute, Tsinghua University, Shanghai Artificial Intelligence Innovation Center, Beijing Municipal Public Security Bureau Artificial Intelligence Security Research Center, Xi'an University of Posts and Telecommunications, Zhejiang University, Institute of Information Engineering, Chinese Academy of Sciences, China Mobile Communications Group Co., Ltd., Xiaomi Technology Co., Ltd., Ant Group Co., Ltd. Co., Ltd., Huawei Cloud Computing Technology Co., Ltd., Beijing Shuanxing Technology Co., Ltd., Beijing Qingshu Wisdom Technology Co., Ltd., Beijing Zero One Wanwu Technology Co., Ltd., Beijing Qihoo Technology Co., Ltd., iFlytek Co., Ltd., Lenovo (Beijing) Co., Ltd., Venusstar Information Technology Group Co., Ltd., AsiaInfo Technologies (Chengdu) Co., Ltd., Hangzhou EZVIZ Software Co., Ltd., Beijing Eastcom Network Technology Co., Ltd. Co., Ltd., Guangdong Information Security Evaluation Center, Xiamen Mayu Co., Ltd., Beijing Ruilai Smart Technology Co., Ltd., Tianyi Security Technology Co., Ltd., Beijing Yuanjian Information Technology Co., Ltd., Shanghai SenseTime Intelligent Technology Co., Ltd., Suzhou Heshuju Information Technology Co., Ltd., Nanjing Lingxing Technology Co., Ltd., Jiangsu Manyun Software Technology Co., Ltd., Changan Communication Technology Co., Ltd., OPPO Guangdong Mobile DYNAMIC COMMUNICATIONS LIMITED. The main drafters of this document are. Zhang Zhen, Tan Zhixing, Zhang Yanting, He Min, Liu Yong, Sun Xudong, Xu Ke, Chen Zhong, Du Jinhao, Hao Chunliang, Ren Kui, Liu Nan, Luo Hongwei, Ye Xiaojun, An Qing, Hu Ying, Wang Yan, Yao Long, Xie Anming, Ji Cheng, Jiang Weiqiang, Ding Zhiguo, Lei Xiaofeng, Dai Jiao, Gu Chen, Zhang Qingqing, Guo Jianling, Zhang Yong, Luo Lei, Liu Yuhong, Liao Shuangxiao, Jiang Hui, Zhao Yun, Zhang Feng, Xu Xiaogeng, Wang Wenyu, Chen Yang, Zhang Xia, Peng Juntao, Bao Chenfu, Wang Haitang, Meng Fanqin, Zhao Lili, Liu Junhua, Li Jiakun, Cui Tingting, Yu Hanyang, Li Fengfeng, Zang Jiaojiao, Lin Guanchen, Ding Xin, Wang Shijin, Han Han, Zhang Xiangzheng, Hu Songzhi, Xu Yiyue, Guan Ming, Zhang Tianyi, Huang Zhe, Liu Jun, Zhou Xue, Zheng Rong, Liu Dong, Luo Xupeng, Zheng Hongdong, Jiang Faqun, Ma Mengna, Tian Weili, Hu Yue, Huang Penghua, Zhang Xiaomin, Zhang Zhongwei, Zhou Cheng, Li Gen, Li Xiaoru, Zhang Bingsheng, Wang Hejun, and Liu Dongbin.

Introduction

Data annotation is a key activity in generative artificial intelligence, which directly determines the quality and security level of training data and generated content. Due to imperfect labeling rules, irregular personnel management, unclear verification standards and other reasons, generative human factors may also be used in the data labeling process. Artificial intelligence introduces new risks and hidden dangers, and standards and specifications are urgently needed to improve the security level of data annotation. The purpose of this document is to help service providers, data annotators and Organizers and data demanders should clarify the security baseline of data labeling and improve the level of service security. Cybersecurity Technology Generative AI Data Annotation Security Specification

1 Scope

This document specifies the security requirements for data annotation platforms or tools for generative AI training, data annotation rule security requirements, data The requirements for labeling personnel and data labeling verification describe the data labeling security evaluation method. This document is applicable to generative artificial intelligence data annotation organizers to carry out training data annotation activities and to The demander can inspect and accept the data labeling, or a third-party organization can provide reference for security assessment of the data labeling.

2 Normative references

The contents of the following documents constitute essential clauses of this document through normative references in this document. For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to This document. GB/T 42755-2023 Artificial Intelligence Data Labeling Procedure for Machine Learning GB/T 45654-2025 Network security technology Basic security requirements for generative artificial intelligence services

3 Terms and definitions

The following terms and definitions apply to this document. 3.1 prompt Input information that guides generative AI models to complete specific tasks and provide reasonable output content. 3.2 Response information In generative AI data annotation, the response information that conforms to human cognition is formed according to the prompt information requirements and is used to train the model. The ability to generate responses to prompts with output of appropriate content, mode, or style. 3.3 Through manual operation or the use of automated technical mechanisms, specific information such as labels, categories, etc. are sent to The process of adding attributes or properties to text, images, audio, video, or other data samples. Note. Hereinafter referred to as “data annotation”. [Source. GB/T 45654-2025, 3.5] 3.4 Data annotation used to train generative artificial intelligence models to be able to complete specific tasks. [Source. GB/T 45654-2025, 3.6] 3.5 Data annotation used to train generative artificial intelligence models to improve the security of output response information. [Source. GB/T 45654-2025, 3.7]
GB/T 45674-2025 English cover page

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 45674-2025_English be delivered?

Answer: Upon your order, we will start to translate GB/T 45674-2025_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 45674-2025_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 45674-2025_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
Terms of Service | Contact Information | Privacy Policy | Refund Policy | Shipping Policy