Path:
Home >
GB/T >
Page206 > GB/T 45230-2025
Price & Delivery
US$759.00 · In stock · Download in 9 secondsGB/T 45230-2025: Data security technology - General framework for confidential computing
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See
step-by-step procedureStatus: Valid
| Std ID | Version | USD | Buy | Deliver [PDF] in | Title (Description) |
| GB/T 45230-2025 | English | 759 |
Add to Cart
|
6 days [Need to translate]
|
Data security technology - General framework for confidential computing
|
Click to Preview a similar PDF
Basic data
| Standard ID | GB/T 45230-2025 (GB/T45230-2025) |
| Description (Translated English) | Data security technology - General framework for confidential computing |
| Sector / Industry | National Standard (Recommended) |
| Classification of Chinese Standard | L80 |
| Classification of International Standard | 35.030 |
| Word Count Estimation | 38,327 |
| Date of Issue | 2025-01-24 |
| Date of Implementation | 2025-08-01 |
| Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 45230-2025: Data security technology - General framework for confidential computing
---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35.030
CCSL80
National Standard of the People's Republic of China
Data security technology confidential computing general framework
Released on 2025-01-24
2025-08-01 Implementation
State Administration for Market Regulation
The National Standardization Administration issued
Table of Contents
Preface III
Introduction IV
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 Abbreviations 2
5 Participating roles and relationships 2
5.1 Participating roles 2
5.2 Relationship Description 3
6 General Framework 3
6.1 Hardware Layer 4
6.2 System Software Layer 5
6.3 System Service Layer 5
6.4 Application Layer 6
6.5 Security Management 6
7 Confidential Computing Services 7
7.1 Basic Security Services 7
7.2 Cryptographic Application Services 11
7.3 Data Protection Services12
7.4 Performance Improvement Service 15
Appendix A (Informative) Confidential Computing Trust Model 19
Appendix B (Informative) Examples of Confidential Computing Application Scenarios 21
B.1 Application scenarios of financial data fusion 21
B.2 Blockchain application scenarios 21
B.3 Insurance institution underwriting query application scenario 22
B.4 Genetic analysis application scenarios 22
B.5 Application scenarios of medical data sharing 23
B.6 Secure Cloud Host Scenario 23
B.7 Application scenarios of federated learning 24
B.8 Multi-party computing application scenarios 24
Appendix C (Informative) Confidential Computing Service Interface Type 26
Appendix D (Informative) Confidential Computing Virtualization 27
D.1 Confidential Computing Virtual Machine Deployment Mode 27
D.2 Confidential Computing Virtual Machine Cross-Platform Migration 28
D.3 Confidential Computing Container Deployment Mode 29
D.4 Cross-platform migration of confidential computing containers 31
Reference 32
Foreword
This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents"
Drafting.
This document was proposed and coordinated by the National Cybersecurity Standardization Technical Committee (SAC/TC260).
This document was drafted by. Huawei Technologies Co., Ltd., China Mobile Communications Group Co., Ltd., China Electronics Technology Standardization Institute,
Institute of Software, Chinese Academy of Sciences, Ant Group Co., Ltd., Beijing Baidu Netcom Technology Co., Ltd., Beijing Volcano Engine Technology
Co., Ltd., Tencent Cloud Computing (Beijing) Co., Ltd., Alibaba Cloud Computing Co., Ltd., Beijing Chongliang Online Technology Co., Ltd., China Mobile
Dongtong Communication Group Design Institute Co., Ltd., Industrial and Commercial Bank of China Co., Ltd., Sichuan University, China Minsheng Bank Co., Ltd., Beijing
National Financial Technology Certification Center Co., Ltd., Beijing Digital Certification Co., Ltd., Hangzhou Anheng Information Technology Co., Ltd., Nanhu
Laboratory, Peking University, Huakong Qingjiao Information Technology (Beijing) Co., Ltd., China Unicom Group Co., Ltd., Super Fusion Digital Technology
Technology Co., Ltd., Shanghai Jiao Tong University, China Information Technology Co., Ltd., Institute of Information Engineering, Chinese Academy of Sciences, Changyang Technology (Beijing) Co., Ltd.
Co., Ltd., Zhengzhou Xindajiean Information Technology Co., Ltd., Hangzhou Wei Information Technology Co., Ltd., Shanghai Fushu Technology Co., Ltd.,
China Electronics Cloud Computing Technology Co., Ltd., Intel (China) Co., Ltd. Beijing Branch, Kunlun Tech (Beijing) Technology Co., Ltd.
Strong striker.
Introduction
Confidential computing is a computing model used to protect data security during use.
Hardware isolation prevents the code and data in the environment from being monitored and manipulated by other software (including privileged software) running on the same device during computing.
Specifically, confidential computing uses an isolation mechanism to separate the ordinary computing environment from the confidential computing environment, so that unauthorized entities cannot
Ability to access confidential computing environments; verify confidential computing environments and applications running in them through certification mechanisms to ensure confidential computing
The integrity and authenticity of the environment and applications; the encryption mechanism is used to ensure that the data at runtime is in ciphertext.
It can be used alone to protect data in use, or it can be combined with other cryptographic techniques (such as multi-party secure computing, homomorphic encryption, etc.) to jointly protect
Protecting runtime data and code, especially for application scenarios such as machine learning, federated learning, blockchain, cloud computing, big data, etc., can be effective
The security protection challenges faced when using data.
This document aims to propose a general confidential computing framework by defining the necessary components of the confidential computing framework, the basic functions it has, and
The confidential computing services formed by the interaction between components improve the usability, security and compatibility of confidential computing related products, and provide a
To meet the cloudification needs of various industries, this document also proposes the deployment of confidential computing virtualization.
model.
Data security technology confidential computing general framework
1 Scope
This document establishes a general framework for confidential computing, describes the core components and basic functions of the framework, and provides confidential computing services and implementations.
Current mechanism.
This document is intended for reference by parties involved in confidential computing when designing, developing, using and deploying confidential computing related products or solutions.
Provide a reference for conducting confidential computing capability assessment activities.
2 Normative references
The contents of the following documents constitute the essential clauses of this document through normative references in this document.
For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to
This document.
GB/T 25069-2022 Information Security Technical Terminology
GB/T 32915-2016 Information security technology Binary sequence randomness detection method
3 Terms and definitions
The terms and definitions defined in GB/T 25069-2022 and the following apply to this document.
3.1
Component
In a system, an identifiable and distinguishable part that implements part of its functionality.
[Source. GB/T 25069-2022, 3.815]
3.2
secure channel secure channel
A communications channel that provides confidentiality and authenticity for exchanged messages.
[Source. GB/T 25069-2022, 3.32, modified]
3.3
A computing model that protects the security of data in use through isolation, encryption, certification and other mechanisms based on trusted hardware.
3.4
A collection of basic hardware and software for performing confidential computing tasks.
3.5
A program that runs in a confidential computing environment and is used to implement confidential computing capabilities.
3.6
A computing environment built based on the confidential computing platform to support the operation of confidential computing applications.
...