Home Cart Quotation Policy About-Us
www.ChineseStandard.net
Database: 221581 (27 Mar 2026)
SEARCH
Path: Home > GB/T > Page206 > GB/T 44602-2024

GB/T 44602-2024 PDF English

Price & Delivery

US$999.00 · In stock · Download in 9 seconds
GB/T 44602-2024: Cybersecurity technology - Cybersecurity technical specification for smart lock products
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid
Std IDVersionUSDBuyDeliver [PDF] inTitle (Description)
GB/T 44602-2024English999 Add to Cart 7 days [Need to translate] Cybersecurity technology - Cybersecurity technical specification for smart lock products

Click to Preview a similar PDF

Basic data

Standard ID GB/T 44602-2024 (GB/T44602-2024)
Description (Translated English) Cybersecurity technology - Cybersecurity technical specification for smart lock products
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.030
Word Count Estimation 50,577
Date of Issue 2024-09-29
Date of Implementation 2025-04-01
Issuing agency(ies) State Administration for Market Regulation, China National Standardization Administration

GB/T 44602-2024: Cybersecurity technology - Cybersecurity technical specification for smart lock products




---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35.030 CCSL80 National Standard of the People's Republic of China Network security technology Intelligent door lock network security technical specifications Released on 2024-09-29 2025-04-01 Implementation State Administration for Market Regulation The National Standardization Administration issued

Table of Contents

Preface III 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 2 5 Overview 2 6 Smart door lock security technical requirements 3 6.1 Smart door lock terminal security technical requirements 3 6.2 Security Technical Requirements for Smart Door Lock Access Gateway 6 6.3 Security Technical Requirements for Smart Door Lock Management Platform 7 6.4 Security technical requirements for smart door lock control terminal 10 6.5 Security requirements 12 7 Smart door lock security evaluation method 14 7.1 Smart Door Lock Terminal Security Evaluation Method 14 7.2 Security Evaluation Method for Smart Door Lock Access Gateway 20 7.3 Security Assessment Methods for Smart Door Lock Management Platform 23 7.4 Smart door lock control terminal security evaluation method 27 7.5 Security Assessment Methods 32 8 Security Level Classification 36 Appendix A (Informative) Analysis of Common Security Risks of Smart Door Locks 37 Appendix B (Normative) Minimum set of basic and enhanced security technical requirements and evaluation methods for smart door locks 39 References 42

Foreword

This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents" Drafting. Please note that some of the contents of this document may involve patents. The issuing organization of this document does not assume the responsibility for identifying patents. This document was proposed and coordinated by the National Cybersecurity Standardization Technical Committee (SAC/TC260). This document was drafted by. The Third Research Institute of the Ministry of Public Security, China Cybersecurity Review and Certification and Market Supervision Big Data Center, National Computer Network and Information Security Management Center, Qingdao Haier Smart Home Appliance Technology Co., Ltd., Institute of Software, Chinese Academy of Sciences, Hangzhou EZVIZ Software Co., Ltd. Ltd., Zhejiang Dahua Technology Co., Ltd., Zhongshan Lock Industry Association, China Mobile Communications Group Co., Ltd., China Telecom Group Co., Ltd. Company, National Information Center, First Institute of Telecommunications Science and Technology Co., Ltd., Alibaba (Beijing) Software Services Co., Ltd., Shenzhen Kai Deshi Intelligent Technology Co., Ltd., Zhejiang Deshiman Technology Intelligence Co., Ltd., Shanghai Jiaweisi Information Technology Co., Ltd., Luke Technology (Beijing) Co., Ltd., Shuobo Information Technology (Shanghai) Co., Ltd., Zhejiang Zhibei Information Technology Co., Ltd., Shanghai Wudun Information Technology Co., Ltd., Yidun (Shanghai) Intelligent Technology Co., Ltd., Yikang Intelligent Technology (Shanghai) Co., Ltd., Dongwu Shian IoT Technology (Jiangsu) Co., Ltd., Information Engineering Institute of the Chinese Academy of Sciences, Huawei Terminal Co., Ltd., China Mobile (Hangzhou) Information Technology Co., Ltd., Qingdao Guochuang Intelligent Home Appliances Research Institute Co., Ltd., Ningbo Zhenhai Shenzhou Locks Co., Ltd., State Grid Zhejiang Electric Power Co., Ltd. Power Science Research Institute, Inner Mongolia Digital Economy Security Technology Co., Ltd., Hangzhou Anheng Information Technology Co., Ltd., Beijing Bangbang Security Technology Co., Ltd. Company, Beijing Zhiyou Network Security Technology Co., Ltd., Shanghai Sidun Information Technology Co., Ltd., Guangdong Sakura Intelligent Technology Co., Ltd., Zhongshan Yang Ge Lock Industry Co., Ltd. and Zhongshan Mingguang Intelligent Technology Co., Ltd. The main drafters of this document are. Liu Jishun, Lu Zhen, Shen Liang, Zhang Yan, Li Haipeng, Sun Yongqing, Hu Jinming, Zhang Zhiqiang, Shen Yongbo, He Qinglin, Li Li, Yang Chen, Yan Min, Li Wei, Yu Xiaojie, Feng Xiuying, Jiang Weiqiang, Wang Lei, Wang Laifu, Chen Yuehua, Gao Jinjun, Fang Qiang, Su Qiyun, Dong Qiguang, Shu Shouheng, Xiang Yang, Li Zhiwei, Zhou Zhengda, Xu Mengyu, Zhu Yixiang, Zhu Pengcheng, Min Hao, Li Fenghua, Chen Zhiyuan, Lu Xiaoming, Wang Kai, Wu Qiliang, Sun Xin, Cai Yuyuan, Zhou Yachao, Lu Zuohua, Cheng Zhili, Zeng Songfeng, Wang Haiqiang, Zhou Lixin, Jin Ze. Network security technology Intelligent door lock network security technical specifications

1 Scope

This document gives the structure of the smart door lock and specifies the network security of the smart door lock terminal, access gateway, management platform, and control terminal. Technical requirements and security level classification are described, and corresponding evaluation methods are described. This document applies to the cybersecurity design, development, testing and evaluation of smart door locks.

2 Normative references

The contents of the following documents constitute essential clauses of this document through normative references in this document. For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to This document. GB/T 18336.1-2024 Cybersecurity technology Information technology security assessment criteria Part 1.Introduction and general model GB/T 18336.3-2024 Cybersecurity technology Information technology security assessment criteria Part 3.Security assurance components GB/T 25069 Information security technical terms GB/T 33745-2017 Internet of Things Terminology GB/T 35273-2020 Information security technology Personal information security specification GB/T 37076-2018 Information security technology fingerprint recognition system technical requirements GB/T 38671-2020 Information security technology remote face recognition system technical requirements

3 Terms and definitions

GB/T 18336.1-2024, GB/T 18336.3-2024, GB/T 25069, GB/T 33745-2017, GB/T 35273- For the purposes of this document, the following terms and definitions are applicable. 3.1 Smart door locks Use biometrics, electronic tags, wireless remote control codes, electronic passwords or remote control commands as authentication credentials to control the door lock to open or close. Close, the door lock system consists of a door lock terminal, an access gateway, a management platform and a control terminal. 3.2 mutual authentication An entity authentication mechanism where both entities provide identity assurance information to each other. [Source. GB/T 15843.1-2017, 3.18]. 3.3 IC card A card with an integrated circuit chip embedded inside. Note. The CPU card is an IC card containing a central processing unit (CPU). 3.4 sensitiveinformation Information that may have a serious impact or damage to users if leaked, modified, destroyed or lost. Note. Sensitive information includes but is not limited to keypad passwords, Bluetooth keys, user personal identification numbers (PINs), user IDs, smart card authentication data, user biometrics, Feature information, device root key and other information.
...

Refund Policy Privacy Policy Terms of Service