HOME   Cart(1)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (26 Oct 2025)

JR/T 0184-2020 English PDF

US$819.00 · In stock
Delivery: <= 6 days. True-PDF full-copy in English will be manually translated and delivered via email.
JR/T 0184-2020: (Technical specification for financial distributed ledger technology)
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
JR/T 0184-2020English819 Add to Cart 6 days [Need to translate] (Technical specification for financial distributed ledger technology) Valid JR/T 0184-2020

PDF similar to JR/T 0184-2020


Standard similar to JR/T 0184-2020

JR/T 0197   GB/T 19584   GB/T 12406   JR/T 0176.4   JR/T 0176.3   JR/T 0177.1   

Basic data

Standard ID JR/T 0184-2020 (JR/T0184-2020)
Description (Translated English) (Technical specification for financial distributed ledger technology)
Sector / Industry Finance Industry Standard (Recommended)
Classification of Chinese Standard A11
Word Count Estimation 34,399
Date of Issue 2020-02-05
Date of Implementation 2020-02-05
Regulation (derived from) Notice of National Financial Standardization Technical Committee (2020.02.05a)
Issuing agency(ies) People's Bank of China

JR/T 0184-2020: (Technical specification for financial distributed ledger technology)

---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Financial distributed ledger technology security specification ICS 35.240.40 A 11 JR People's Republic of China Financial Industry Standards Financial Distributed Ledger Technology Security Specification 2020-02-05 release 2020-02-05 Implementation Issued by the People's Bank of China

Table of contents

Foreword...I Introduction...II 1 Scope...1 2 Normative references...1 3 Terms and definitions...1 4 Abbreviations...6 5 Security System Framework...6 6 Basic hardware...7 6.1 Basic requirements...7 6.2 Physical Security...7 6.3 Network Security...7 7 Basic Software...8 7.1 Basic requirements...8 7.2 Ledger structure...8 7.3 Consensus module...8 7.4 Distributed networking...8 7.5 Data Storage...8 7.6 Smart Contract...8 7.7 Interface Design...9 7.8 Data Transmission...9 7.9 Time synchronization...9 7.10 Operating System...9 8 Cryptographic Algorithm...9 8.1 Basic requirements...9 8.2 Confidentiality...9 8.3 Completeness...9 8.4 Authenticity...10 8.5 Non-repudiation...10 8.6 Randomness...10 8.7 Key Management...10 9 Node Communication...10 9.1 Basic requirements...10 9.2 Node authentication...10 9.3 Communication integrity...10 9.4 Communication confidentiality...11 10 Ledger Data...11 10.1 Completeness...11 10.2 Consistency...11 10.3 Confidentiality...11 10.4 Validity...11 10.5 Ledger data redundancy...11 10.6 Access and use...11 10.7 Security Audit...11 11 Consensus Agreement...12 11.1 Basic requirements...12 11.2 Legality...12 11.3 Correctness...12 11.4 Finality...12 11.5 Consistency...12 11.6 Unforgeability...12 11.7 Availability...12 11.8 Robustness...12 11.9 Fault tolerance...13 11.10 Supervisability...13 11.11 Low Latency...13 11.12 Incentive compatibility...13 11.13 Scalability...13 12 Smart Contract...13 12.1 Basic requirements...13 12.2 Version Control...13 12.3 Access Control...13 12.4 Complexity Limitation...13 12.5 Atomicity...14 12.6 Consistency...14 12.7 Security Audit...14 12.8 Life Cycle Management...14 12.9 Attack Defense...14 12.10 Security Verification...14 13 Identity Management...14 13.1 Basic requirements...14 13.2 Identity definition...14 13.3 Identity Registration...15 13.4 Identity Verification...15 13.5 Account Management...15 13.6 Credential Lifecycle Management...16 13.7 Identity Authentication...17 13.8 Node ID Management...18 13.9 Identity renewal and revocation...18 13.10 Identity Information Security...18 13.11 Identity supervision audit requirements...19 14 Privacy protection...20 14.1 Privacy protection principles...20 14.2 Privacy protection content...20 14.3 Privacy Protection Policy...20 14.4 Privacy protection technical requirements...21 14.5 Privacy protection monitoring and auditing...22 15 Regulatory Support...22 15.1 Basic requirements...22 15.2 System Supervision...22 15.3 Information Management...22 15.4 Event handling...22 15.5 Transaction Intervention...22 15.6 Smart Contract Supervision...22 16 Operation and maintenance requirements...22 16.1 Basic requirements...23 16.2 Device Management...23 16.3 Node Monitoring...23 16.4 Node version upgrade...23 16.5 Bug fixes...23 16.6 Backup and Restore...23 16.7 Emergency plan management...24 16.8 Rights Management...24 16.9 Proposal Mechanism...24 17 Governance Mechanism...24 17.1 Basic requirements...24 17.2 Governance structure...24 17.3 Key Points of Control...25 References...27

Foreword

This standard was drafted in accordance with the rules given in GB/T 1.1-2009. This standard was proposed by the Digital Currency Research Institute of the People's Bank of China. This standard is under the jurisdiction of the National Financial Standardization Technical Committee (SAC/TC 180). The organization responsible for drafting this standard. Digital Currency Research Institute of the People's Bank of China. Participated in the drafting of this standard. Science and Technology Department of the People’s Bank of China, Industrial and Commercial Bank of China, Agricultural Bank of China, Bank of China, China Construction Bank, China Development Bank, Ping An Bank, China Merchants Bank, Shenzhen Qianhai WeBank Co., Ltd., Zhejiang Netshang Bank Co., Ltd. Company, Tsinghua University, Shanghai Jiaotong University, Nanjing University, Zhejiang University, China Banknote Hangzhou Blockchain Technology Research Institute, China Information and Communication Research Institute Research Institute, CICC Guosheng Certification Co., Ltd., Bank Card Testing Center, JD Digital Technology Holdings Co., Ltd., Baidu Online Network Technology (North Beijing) Co., Ltd., Chengdu Weishitong Information Industry Co., Ltd. The main drafters of this standard. Mu Changchun, Li Wei, Di Gang, Yao Qian, Yang Fuyu, Li Xingfeng, Qu Weimin, Zhao Xinyu, Qian Youcai, Zhang Hongbo, Shi Zhan, Zhang Honghui, Cui Peidong, Wang Yanbo, Lin Hua, Chen Zhong, Zhang Dawei, Zhou Ziheng, Su Heng, Wang Peng, Xiao Yao, Wang Weiqiang, Fan Yuanyuan, Wu Weisi, Zhang Yuming, Li Bin, Zuo Min, Yu Xiao, Lu Haining, Zhong Sheng, Cai Liang, Lian Na, Wei Kai, Wen Yuhui, Chen Cong, Cao Peng, Xiao Wei, Wu Bo.

Introduction

Distributed ledger technology is a high integration of multiple core technology systems such as cryptographic algorithms, consensus mechanisms, peer-to-peer communication protocols, and distributed storage. A distributed infrastructure and computing paradigm formed by the combination. At the stage when the form of distributed ledger technology is still plastic, it is necessary to formulate key Technical safety regulations, so that financial institutions can deploy and maintain systems in accordance with appropriate safety requirements, avoid security shortcomings, and provide The large-scale application of the ledger technology provides business assurance capabilities and information security risk restraint capabilities, and has a positive effect on industrial applications. To implement the "Thirteenth Five-Year Development Plan for Information Technology in China’s Financial Industry" (Yinfa [2017] No. 140) and "Financial Technology (FinTech) Development Plan (2019-2021)” (Yinfa [2019] No. 209 issued), standardize the distributed ledger technology in The application of the financial field to improve the information security guarantee capability of distributed ledger technology, this standard is specially formulated. Financial Distributed Ledger Technology Security Specification

1 Scope

This standard specifies the security system of financial distributed ledger technology, including basic hardware, basic software, cryptographic algorithms, node communication, Ledger data, consensus agreements, smart contracts, identity management, privacy protection, regulatory support, operation and maintenance requirements, and governance mechanisms. This standard applies to institutions engaged in the construction of distributed ledger systems or service operations in the financial sector.

2 Normative references

The following documents are indispensable for the application of this document. For dated reference documents, only the dated version applies to this document. For undated references, the latest version (including all amendments) applies to this document. GB/T 22239-2019 Information Security Technology Network Security Level Protection Basic Requirements GB/T 32905-2016 Information security technology SM3 cryptographic hash algorithm GB/T 32907-2016 Information Security Technology SM4 Block Cipher Algorithm GB/T 32918-2016 (all parts) Information Security Technology SM2 Elliptic Curve Public Key Cryptography Algorithm GB/T 35273-2017 Information Security Technology Personal Information Security Specification GB/T 37092-2018 Information Security Technology Cryptographic Module Security Requirements GM/T 0006-2012 Code Application Identification Specification GM/T 0009-2012 SM2 cryptographic algorithm usage specification GM/T 0010-2012 SM2 cryptographic algorithm encryption signature message syntax specification GM/T 0015-2012 Digital certificate format specification based on SM2 cryptographic algorithm GM/T 0028-2014 Security technical requirements for cryptographic modules GM/T 0039-2015 Password module security testing requirements GM/T 0044-2016 (all parts) SM9 identification password algorithm GM/T 0045-2016 Financial Data Cryptographic Machine Technical Specification GM/T 0054-2018 Information system password application basic requirements

3 Terms and definitions

The following terms and definitions apply to this document. 3.1 Digital signature The data attached to the data unit, or the cryptographic transformation of the data unit, which allows the reception of the data unit It is used to confirm the source and integrity of the data unit, and to protect the data from being forged or denied by others (such as the recipient). [GB/T 25069-2010, definition 2.2.2.176] 3.2 Hash function A function that maps a bit string to a fixed-length bit string. The function satisfies the following two characteristics. --For a given output, it is computationally infeasible to find the input mapped to the output; --For a given input, finding the second input that maps to the same output is computationally infeasible. Note. The computational feasibility depends on the specific safety requirements and environment. [GB/T 25069-2010, definition 2.2.2.166] 3.3 Symmetric cipher A cryptographic technique that uses the same secret key in both encryption and decryption algorithms. [GB/T 25069-2010, definition 2.2.2.26] 3.4 Asymmetric cipher Based on the system of asymmetric cryptography, public transformation is used for encryption and private transformation is used for decryption. vice versa. [GB/T 25069-2010, definition 2.2.2.30] 3.5 Random number A time-varying parameter whose value is unpredictable. [GB/T 25069-2010, definition 2.2.2.182] 3.6 Certificate A type of data about an entity that is signed by the private key or secret key of the certification authority and cannot be forged. [GB/T 25069-2010, definition 2.2.2.218] 3.7 CA certificate CA-certificate A certificate issued by one CA to another CA. [GB/T 25069-2010, definition 2.2.2.219] 3.8 Access control A means to ensure that the resources of the data processing system can only be accessed by authorized subjects in an authorized manner. [GB/T 25069-2010, definition 2.2.1.42] 3.9 Zero-knowledge proof A method used to verify that a certain witness knows a certain secret without revealing the secret and related information. 3.10 Group signature Any member of a group can sign a message on behalf of the entire group anonymously. 3.11 Ring signature The signer specifies a set (or ring) of possible signers and signs a message. The verifier can be sure that the signature A member of is generated, but the real signer cannot be pointed out. 3.12 Privacy protection Measures taken to protect privacy. For example. restrictions on the collection, processing and use of personal data. [GB/T 25069-2010, definition 2.2.1.122] 3.13 Identity-based cryptographic algorithm The user’s public and private key pair is generated through the user’s identity, which is mainly used for digital signature, data encryption, key exchange and personal identification. Certification, etc. 3.14 Homomorphic encryption A form of encryption that uses specific algebraic operations to process encrypted data to obtain an output, which is decrypted, and the result is The result is consistent with the output result obtained by processing unencrypted data in the same way. 3.15 Secret sharing A cryptographic technique that divides and stores a secret (key), which can be pieced together by combining the divided parts. 3.16 Peer-to-peer network A computer network that contains only nodes equivalent to control and operation capabilities. 3.17 Consensus protocol The calculation method used to reach agreement among nodes in the distributed ledger system. 3.18 Distributed ledger A database that can be jointly managed and shared in a network composed of multiple sites, different geographic locations, or multiple institutions. 3.19 Distributed ledger technology A collection of technologies that implement distributed ledgers, which are the cores of cryptographic algorithms, consensus mechanisms, point-to-point communication protocols, distributed storage, etc. A distributed infrastructure and computing paradigm formed by the highly integrated technology system. 3.20 Smart contract A computer protocol designed to spread, verify, or execute contracts in an information-based way, which is embodied in a distributed ledger that can be automatically executed Computer program. 3.21 Denial of service An attack that makes the system unavailable. [GB/T 25069-2010, definition 2.2.1.75] 3.22 Node An entity that provides all or part of the functions of a distributed ledger. 3.23 Transaction validation node The node responsible for verifying the submitted transaction data. 3.24 Consensus node The node responsible for the consistency of the ledger data. 3.25 Accounting node The node responsible for the integrity of the ledger data. 3.26 Authentication code The bit string output by the message authentication code algorithm. Note. The message authentication code is sometimes called the password check value. [GB/T 25069-2010, definition 2.2.2.65] 3.27 Data integrity The data has not been altered or destroyed in an unauthorized manner. [GB/T 25069-2010, definition 2.1.36] 3.28 Confidentiality The feature that prevents information from being disclosed to unauthorized individuals, entities, processes, or being used by them. [GB/T 25069-2010, definition 2.1.1] 3.29 Unlinkability The anonymous identity shown by the same user during multiple transactions cannot be restored to the same user. 3.30 Consistency In a certain system or component, the degree of uniformity, standardization and non-contradiction between documents or parts. [GB/T 25069-2010, definition 2.1.62] 3.31 Finality Once the transaction is confirmed, it will not be rolled back or cancelled. 3.32 Incentive compatibility A kind of institutional arrangement that makes the behavior of the actor to pursue individual interests coincides with the goal of maximizing value as a whole. 3.33 Local broadcast It avoids the spread of information on the entire distributed ledger by only sending information to authorized related party nodes. 3.34 Mixing By severing the relationship between the parties to the transaction, the transaction flow is difficult to be analyzed and tracked to protect the details of the transaction. 3.35 Local clustering coefficient A coefficient indicating the degree of aggregation of individual nodes in a graph. 3.36 Atomicity If an error occurs during the execution of the smart contract, it will be rolled back to the state before the start of the smart contract. 3.37 Turing complete In the theory of computability, a series of rules for manipulating data (such as instruction sets, programming languages, cellular automata) can be used to simulate single With Turing machine. 3.38 Non-repudiation Also called non-repudiation, it proves the undeniable nature of an operation that has occurred. [GM/Z 0001-2013, definition 2.46] 3.39 Identity information Information that can be used alone or in combination with other information to identify and track the identity of a specific natural person or reflect the activities of a specific natural person. 3.40 Privacy It has nothing to do with the public interest, except that it can only be used publicly for the party who has the obligation to keep confidential, the personal information that the party does not want a third party to know and The personal domain that the party does not want a third party to invade. Note. The three elements of privacy protection. --The subject of privacy is a natural person; --The object of privacy is the personal information and personal fields of natural persons; --Privacy content refers to facts or behaviors that specific individuals do not disclose their information or domains, and do not want others to detect or interfere. 3.41 Private information The identification information of a specific natural person and its activity information in a specific system. 3.42 Personal information Recorded electronically or in other ways that can identify a specific natural person alone or in combination with other information or reflect a specific nature Various information about people’s activities. Note. Personal information includes name, date of birth, ID number, personal biometric information, address, communication contact information, communication records and content, Account password, property information, credit information, whereabouts, accommodation information, health and physiological information, transaction information, etc. [GB/T 35273-2017, definition 3.1] 3.43 Controller A natural person, legal person or other organization that determines the purpose and method of processing personal information alone or jointly with others. 3.44 Intervention mechanism Prohibiting or restricting specific behaviors of specific roles participating in the financial distributed ledger system is an emergency braking measure provided for abnormal situations. 3.45 Block cipher The cryptographic algorithm used performs operations on the plaintext block (that is, a bit string with a defined length) to generate a symmetric cryptogram of the ciphertext block. [GB/T 25069-2010, definition 2.2.2.82] 3.46 Stream cipher A symmetric cryptosystem with the following properties. its encryption algorithm uses a certain reversible function to combine the sequence of plaintext symbols with the sequence of key stream symbols. Combine them one symbol at a time for transformation. It can be divided into two types. synchronous stream/serial cipher and self-synchronous stream/serial cipher. [GB/T 25069-2010, definition 2.2.2.85] 3.47 Key exchange Securely establish a shared key negotiation process between communicating entities. [GB/T 25069-2010, definition 2.2.2.119]

4 Abbreviations

The following abbreviations apply to this document.

5 Security System Framework

The security system of financial distributed ledger technology includes basic hardware, basic software, cryptographic algorithms, node communication, ledger data, and consensus protocols. Discussion, smart contracts, identity management, privacy protection, regulatory support, operation and maintenance requirements, and governance mechanisms. Financial distributed ledger technology security The whole system framework is shown in Figure 1.

6 Basic hardware

6.1 Basic requirements The basic hardware environment should follow the physical and network-related requirements of Level 3 and above in GB/T 22239-2019. 6.2 Physical security 6.2.1 Site safety The deployed physical data center and ancillary facilities meet the following requirements. --For the cloud deployment model, ensure that the operating environment of the data center used in the financial industry is located in a high-security area; --For system nodes that undertake the functions of consensus nodes or bookkeeping nodes, it is advisable to ensure the business operation and data of financial distributed ledger users The physical equipment for storage and processing is located in China. 6.2.2 Hardware equipment It should monitor the operating status of equipment and resource usage, and be able to issue alarms when abnormal conditions occur. It shall be ensured that the data carried by the equipment and storage media can be cleared and cannot be restored when they are reused, scrapped or replaced. It should be ensured that the hardware devices used by different nodes have a certain degree of heterogeneity. For the cloud deployment model, with the cooperation of the cloud environment service provider, the cloud environment should be guaranteed to have a certain degree of heterogeneity. 6.2.3 Node deployment security Redundant deployment of key nodes should be guaranteed to ensure system availability. It should be avoided to deploy all nodes undertaking consensus or accounting in the same computer room, and it should be able to ensure the integrity of the system when a single computer room node is unavailable. Physical availability. It should be ensured that distributed ledger nodes with unsuitable data are placed inside the organization or in a protected area. It should be ensured that the storage capacity of the hardware equipment of the deployed node can be expanded to avoid the inability to synchronize the ledger because the data capacity reaches the upper limit. 6.2.4 Hardware encryption device security For a distributed ledger system that uses hardware encryption equipment to complete cryptographic operations and key storage, the hardware encryption equipment used should meet the following requirements Claim. --The encryption machine equipment used should meet the requirements of GM/T 0045-2016 promulgated by the national password management department; --The personal password equipment used (such as UKey, encryption card, mobile terminal with SE or TEE, etc.) should comply with the industry authorities and The requirements of the national password management department. 6.3 Cybersecurity 6.3.1 Network architecture security It should be ensured that there can be direct network communication or indirect message transmission between consensus nodes or accounting nodes. In the network topology, a single node failure should be prevented to form network isolation. It should be ensured that each important node has a large local clustering coefficient. 6.3.2 Communication transmission security A secure transmission channel should be established between the nodes participating in the distributed ledger to ensure the integrity and non-tampering of data transmission. Corresponding protective measures should be taken for data and information to ensure that it can resist active or passive attacks such as tampering and replay. Cryptographic technology should be used to ensure the confidentiality of sensitive information fields or the entire message in the communication process between nodes, and to ensure that information is stored and transmitted. It will not be read or tampered by unauthorized users during the input process. Authorized network access control can be used to construct a virtual private network (VPN) between participating distributed ledger nodes to reduce network The harm caused by the attack.

7 Basic software

7.1 Basic requirements The basic software environment should comply with the host security, application security, data security and backup and recovery phases of GB/T 22239-2019 and above. Related requirements, it should also include ledger structure, consensus module, distributed networking, data storage, smart contracts, interface design, data transmission, time Synchronization and operating system requirements. 7.2 Ledger structure The ledger structure should be tamper-proof. The ledger structure should use a block chain or a similar block chain storage structure, and the hash nesting guarantee should be used The data is difficult to tamper with. The ledger should have a data verification function. After any record is illegally tampered with, it can be traced back through historical ledger data for quick verification. 7.3 Consensus module The consensus module should be able to coordinate all system participants to participate in the data packaging and consensus process in an orderly manner, and ensure the data consistency of each participant. When the system has no faulty nodes or fraudulent nodes, it should be able to reach an unanimous and correct consensus within the specified time and output correct results. In the case that the total number of failed nodes and fraudulent nodes does not exceed the theoretical value, the system should work normally. 7.4 Distributed networking The system participant nodes should be separated in physical deployment, and each node communicates and exchanges data based on network communication protocols and peer-to-peer networks. change. Each node should independently store consistent ledger data, and ensure that any single node failure does not affect the normal work of the entire system. Made. The system is interconnected by nodes distributed in different locations, and there is no central node in the network. The communication control function should be distributed on each node, And any node establishes a communication connection with at least two other nodes. 7.5 Data storage Ledger data should be stored independently according to the type of d...

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of JR/T 0184-2020_English be delivered?

Answer: Upon your order, we will start to translate JR/T 0184-2020_English as soon as possible, and keep you informed of the progress. The lead time is typically 4 ~ 6 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of JR/T 0184-2020_English with my colleagues?

Answer: Yes. The purchased PDF of JR/T 0184-2020_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.

Refund Policy     Privacy Policy     Terms of Service     Shipping Policy     Contact Information