Path:
Home >
GB/T >
Page207 > GB/T 40650-2021
Price & Delivery
US$249.00 · In stock · Download in 9 secondsGB/T 40650-2021: Information security technology - Trusted computing specification - Trusted platform control module
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See
step-by-step procedureStatus: Valid
| Std ID | Version | USD | Buy | Deliver [PDF] in | Title (Description) |
| GB/T 40650-2021 | English | 249 |
Add to Cart
|
3 days [Need to translate]
|
Information security technology - Trusted computing specification - Trusted platform control module
|
Click to Preview a similar PDF
Basic data
| Standard ID | GB/T 40650-2021 (GB/T40650-2021) |
| Description (Translated English) | Information security technology - Trusted computing specification - Trusted platform control module |
| Sector / Industry | National Standard (Recommended) |
| Classification of Chinese Standard | L80 |
| Word Count Estimation | 13,184 |
| Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 40650-2021: Information security technology - Trusted computing specification - Trusted platform control module
---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology - Trusted computing specification - Trusted platform control module
ICS 35.030
CCSL80
National Standards of People's Republic of China
Information Security Technology Trusted Computing Specification
Trusted Platform Control Module
Released on 2021-10-11
2022-05-01 implementation
State Administration for Market Regulation
Issued by the National Standardization Management Committee
Table of contents
Foreword Ⅰ
1 Scope 1
2 Normative references 1
3 Terms and definitions 1
4 Abbreviations 2
5 Overview 2
5.1 Trusted platform control module positioning 2
5.2 Interaction between Trusted Platform Control Module and Peripheral 3
5.3 Other 3
6 Functional composition of trusted platform control module 4
6.1 Functional composition framework 4
6.2 Hardware layer 4
6.3 Basic software layer 4
6.4 Functional component layer 4
6.5 Interconnection interface 5
7 Interface of Trusted Platform Control Module 5
7.1 Computing component interface 5
7.2 Trusted Software Base Interface 5
7.3 Management interface 5
7.4 Trusted cryptographic module interface 6
8 Security 6
8.1 Identification 6
8.2 Resource Access Control 6
8.3 Audit 6
8.4 Storage space safety requirements 7
8.5 Data protection 7
8.6 Physical protection 7
9 Operation and maintenance 7
9.1 Self-check 7
9.2 Status Maintenance 7
10 Confirmation method 8
10.1 Trusted platform control module of trusted computing node 8
10.2 Functional composition of trusted platform control module 8
10.3 Interface of Trusted Platform Control Module 8
10.4 Safety protection 9
10.5 Operation and maintenance 10
Foreword
This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for Standardization Work Part 1.Structure and Drafting Rules of Standardization Documents"
Drafting.
Please note that some of the contents of this document may involve patents. The issuing agency of this document is not responsible for identifying patents.
This document was proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260).
Drafting organizations of this document. Huada Semiconductor Co., Ltd., Beijing University of Technology, Beijing Trustworthy Huatai Information Technology Co., Ltd., Global Energy
Internet Research Institute Co., Ltd., Shanghai Suanshi Technology Co., Ltd., Tongji University, Alibaba (China) Co., Ltd., Inspur (Beijing) Electronics
Information Industry Co., Ltd., China Shipbuilding Industry Corporation 709th Research Institute, Wuhan University, Shanghai Zhaoxin Integrated Circuit Co., Ltd.,
Guangdong Jiuzhang Information Technology Co., Ltd., Shanghai Industrial Control Safety Innovation Technology Co., Ltd., Lanma Zhuoxin Technology (Shanghai) Co., Ltd.,
Zhong'an Technology Group Co., Ltd., Beijing New Cloud Oriental System Technology Co., Ltd.
The main drafters of this document. Huang Jianhui, Zhang Jianbiao, Wang Guan, Hu Jun, Wang Yubo, Gong Bei, Ning Zhenhu, Sun Yu, Gao Kunlun, Zhao Baohua, Jiang Changjun,
Yu Jian, Hong Yu, Wang Liang, Yang Huan, Fu Yingfang, Xiao Peng, Xu Mingdi, Wu Baoxi, Su Zhenyu, Wang Juan, Xue Gangru, Ling Jinhong, Liu Hong, Cheng Jun, Su Qiuyu,
Liu Jianli, Xu Wanshan, Wang Xiao, Yang Yongdang.
Information Security Technology Trusted Computing Specification
Trusted Platform Control Module
1 Scope
This document describes the position and role of the trusted platform control module in the trusted computing node, and specifies the functions of the trusted platform control module.
Capability, functional interface, safety protection, operation and maintenance requirements and verification methods.
This document is applicable to the design, production, operation, maintenance and evaluation of the trusted platform control module.
2 Normative references
The content of the following documents constitutes an indispensable clause of this document through normative references in the text. Among them, dated quotations
Only the version corresponding to the date is applicable to this document; for undated reference documents, the latest version (including all amendments) is applicable to
This document.
GB/T 29829 Information Security Technology Trusted Computing Cryptographic Support Platform Function and Interface Specification
GB/T 37935 Information Security Technology Trusted Computing Specification Trusted Software Base
GM/T 0008 Security Chip Password Detection Guidelines
3 Terms and definitions
The following terms and definitions apply to this document.
3.1
Trustedcryptographymodule
A module that has functions such as cryptographic operations required by trusted computing and can provide protected storage space.
3.2
Trustedcomputingnode
A computing node that is composed of trusted protection components and computing components, and has the function of computing and protecting parallel operation.
3.3
Trusted Platform Control Module trustedplatformcontrolmodule
The protection component components integrated in the trusted computing node are composed of hardware, software and firmware, and the hardware, software and firmware of the computing component
Parallel connection is a basic core module used to establish and guarantee the source of trust. It provides active measurement, active control, and active control for trusted computing nodes.
Functions such as trusted verification, encryption protection, trusted report, and password invocation.
3.4
Valid state enabledstate
The trusted platform control module is in a working state that can receive and execute all instructions.
3.5
Disable state
The trusted platform control module is in a special working state where it can only execute query and enable commands.
3.6
Active self-checking
The trusted platform controls the detection operation of the module's internal specified content after the module is powered on.
...