GB/T 37935-2019 PDF EnglishUS$519.00 · In stock · Download in 9 seconds
GB/T 37935-2019: Information security technology - Trusted computing specification - Trusted software base Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure Status: Valid
Similar standardsGB/T 37935-2019: Information security technology - Trusted computing specification - Trusted software base---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT37935-2019 Information security technology - Trusted computing specification - Trusted software base ICS 35.040 L80 National Standards of People's Republic of China Information Security Technology Trusted Computing Specification Trusted software base Informationsecuritytechnology-Trustedcomputingspecification- Trustedsoftwarebase Published on.2019-08-30 2020-03-01 implementation State market supervision and administration China National Standardization Administration issued Content Foreword III 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 2 5 overall structure 2 6 function module 3 6.1 Basic Trust Base 3 6.2 Control mechanism 3 6.3 Metrics 4 6.4 Decision mechanism 4 6.5 Trusted Reference Library 4 6.6 Support mechanism 4 6.7 Collaboration mechanism 5 7 interactive interface 5 7.1 Internal Interaction Interface 5 7.2 External Interaction Interface 6 8 Workflow 7 8.1 Workflow 7 during system startup 8.2 Workflow in the process of system operation 8 9 Self-safety requirements 9 9.1 Security of the TSB interactive interface 9 9.2 Trusted Root Entity for TSB Protection 9 Appendix A (informative) Trusted Policy Management Center 10 Appendix B (informative) Internal interactive interface design example 11 B.1 Basic Definition 11 B.1.1 Measurement Results Data Structure 11 B.1.2 Reference value data structure 11 B.1.3 Measurement result Return value definition 11 B.1.4 Baseline Library Return Value Definition 12 B.1.5 Decision result Return value definition 12 B.1.6 Control mode definition 12 B.1.7 Control Strategy Return Value Definition 12 B.1.8 Trusted Software Base Context Data Structure 13 B.2 Interfaces provided by each functional mechanism 16 B.2.1 Interactive interface provided by the measurement mechanism 16 B.2.2 Interaction interface provided by the decision mechanism 17 B.2.3 Interactive interface provided by the trusted reference library 17 B.2.4 Control mechanism provides interactive interface 20 Reference 21 ForewordThis standard was drafted in accordance with the rules given in GB/T 1.1-2009. Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents. This standard is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This standard was drafted. Beijing Trustworthy Huatai Information Technology Co., Ltd., Beijing University of Technology, China Standard Software Co., Ltd., global energy mutual Network Research Institute Co., Ltd., Renmin University of China, China Shipbuilding Industry Corporation 7th Research Institute, Beijing Xinyun Oriental System Technology Limited Liability Company, Huada Semiconductor Co., Ltd., Beijing Dean Information Technology Co., Ltd., Inspur (Beijing) Electronic Information Industry Co., Ltd. The main drafters of this standard. Sun Yu, Ning Zhenhu, Hu Jun, Zhao Baohua, Dong Junping, Shen Chuchu, Wu Xin, Huang Jianhui, Hong Yu, Zhang Jianbiao, Wang Tao, Liang Peng, Song Yuan, Zhou Xiaogang, Zong Dongrui, Tian Jiansheng, Wang Zhiwei, Xu Ning, Ma Hongfu, Yang Zidong, Wang Yibo, Xu Mingdi, Zhang Minjian, Wang Zhenyu, Huang Lei, Wang Dahai, Xia Pan. Information Security Technology Trusted Computing Specification Trusted software base1 ScopeThis standard specifies the functional structure, workflow, support requirements and interactive interface specifications of the trusted software base. This standard applies to the design, production and evaluation of trusted software foundations.2 Normative referencesThe following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article. Pieces. For undated references, the latest edition (including all amendments) applies to this document. GB/T 29827-2013 Information Security Technology Trusted Computing Specification Trusted Platform Motherboard Function Interface GB/T 29828-2013 Information Security Technology Trusted Computing Specification Trusted Connection Architecture GB/T 29829-2013 Information security technology trusted computing password support platform function and interface specification IETFRFC5209 Network Terminal Evaluation. Overview and Requirements [NetworkEndpointAssessment(NEA).Overview andRequirements]3 Terms and definitionsGB/T 29827-2013, GB/T 29828-2013, GB/T 29829-2013 and the following terms and definitions apply to This document. For ease of use, some of the terms and definitions in GB/T 29829-2013 are repeated below. 3.1 Trusted Computing Platform trustedcomputingplatform A support system built into a computing system for implementing trusted computing functions. [GB/T 29829-2013, definition 3.1.1] 3.2 Host base software legacyfundamentalsoftware A general term for software that implements regular functional parts (such as operating systems) in a trusted computing platform. 3.3 Trusted software base trustedsoftwarebase A collection of software elements that provide support for the trustworthiness of a trusted computing platform. 3.4 Basic trust base fundamentaltrustedsoftware A component responsible for trusted booting of hosted base software and other component integrity metrics based on trusted software. 3.5 Trusted baseline value trustedbaselinevalue The data indicating the trusted characteristics of the object is used as a reference for judging whether the object is authentic. 3.6 Trusted base library trustedbaselinevaluedatabase A collection of trusted baseline values. GB/T 37935-2019 Information security technology - Trusted computing specification - Trusted software base ICS 35.040 L80 National Standards of People's Republic of China Information Security Technology Trusted Computing Specification Trusted software base Informationsecuritytechnology-Trustedcomputingspecification- Trustedsoftwarebase Published on.2019-08-30 2020-03-01 implementation State market supervision and administration China National Standardization Administration issued Content Foreword III 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 2 5 overall structure 2 6 function module 3 6.1 Basic Trust Base 3 6.2 Control mechanism 3 6.3 Metrics 4 6.4 Decision mechanism 4 6.5 Trusted Reference Library 4 6.6 Support mechanism 4 6.7 Collaboration mechanism 5 7 interactive interface 5 7.1 Internal Interaction Interface 5 7.2 External Interaction Interface 6 8 Workflow 7 8.1 Workflow 7 during system startup 8.2 Workflow in the process of system operation 8 9 Self-safety requirements 9 9.1 Security of the TSB interactive interface 9 9.2 Trusted Root Entity for TSB Protection 9 Appendix A (informative) Trusted Policy Management Center 10 Appendix B (informative) Internal interactive interface design example 11 B.1 Basic Definition 11 B.1.1 Measurement Results Data Structure 11 B.1.2 Reference value data structure 11 B.1.3 Measurement result Return value definition 11 B.1.4 Baseline Library Return Value Definition 12 B.1.5 Decision result Return value definition 12 B.1.6 Control mode definition 12 B.1.7 Control Strategy Return Value Definition 12 B.1.8 Trusted Software Base Context Data Structure 13 B.2 Interfaces provided by each functional mechanism 16 B.2.1 Interactive interface provided by the measurement mechanism 16 B.2.2 Interaction interface provided by the decision mechanism 17 B.2.3 Interactive interface provided by the trusted reference library 17 B.2.4 Control mechanism provides interactive interface 20 Reference 21ForewordThis standard was drafted in accordance with the rules given in GB/T 1.1-2009. Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents. This standard is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This standard was drafted. Beijing Trustworthy Huatai Information Technology Co., Ltd., Beijing University of Technology, China Standard Software Co., Ltd., global energy mutual Network Research Institute Co., Ltd., Renmin University of China, China Shipbuilding Industry Corporation 7th Research Institute, Beijing Xinyun Oriental System Technology Limited Liability Company, Huada Semiconductor Co., Ltd., Beijing Dean Information Technology Co., Ltd., Inspur (Beijing) Electronic Information Industry Co., Ltd. The main drafters of this standard. Sun Yu, Ning Zhenhu, Hu Jun, Zhao Baohua, Dong Junping, Shen Chuchu, Wu Xin, Huang Jianhui, Hong Yu, Zhang Jianbiao, Wang Tao, Liang Peng, Song Yuan, Zhou Xiaogang, Zong Dongrui, Tian Jiansheng, Wang Zhiwei, Xu Ning, Ma Hongfu, Yang Zidong, Wang Yibo, Xu Mingdi, Zhang Minjian, Wang Zhenyu, Huang Lei, Wang Dahai, Xia Pan. Information Security Technology Trusted Computing Specification Trusted software base1 ScopeThis standard specifies the functional structure, workflow, support requirements and interactive interface specifications of the trusted software base. This standard applies to the design, production and evaluation of trusted software foundations.2 Normative referencesThe following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article. Pieces. For undated references, the latest edition (including all amendments) applies to this document. GB/T 29827-2013 Information Security Technology Trusted Computing Specification Trusted Platform Motherboard Function Interface GB/T 29828-2013 Information Security Technology Trusted Computing Specification Trusted Connection Architecture GB/T 29829-2013 Information security technology trusted computing password support platform function and interface specification IETFRFC5209 Network Terminal Evaluation. Overview and Requirements [NetworkEndpointAssessment(NEA).Overview andRequirements]3 Terms and definitionsGB/T 29827-2013, GB/T 29828-2013, GB/T 29829-2013 and the following terms and definitions apply to This document. For ease of use, some of the terms and definitions in GB/T 29829-2013 are repeated below. 3.1 Trusted Computing Platform trustedcomputingplatform A support system built into a computing system for implementing trusted computing functions. [GB/T 29829-2013, definition 3.1.1] 3.2 Host base software legacyfundamentalsoftware A general term for software that implements regular functional parts (such as operating systems) in a trusted computing platform. 3.3 Trusted software base trustedsoftwarebase A collection of software elements that provide support for the trustworthiness of a trusted computing platform. 3.4 Basic trust base fundamentaltrustedsoftware A component responsible for trusted booting of hosted base software and other component integrity metrics based on trusted software. 3.5 Trusted baseline value trustedbaselinevalue The data indicating the trusted characteristics of the object is used as a reference for judging whether the object is authentic. 3.6 Trusted base library trustedbaselinevaluedatabase A collection of trusted baseline values. ......Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al. Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of English version of GB/T 37935-2019 be delivered?Answer: The full copy PDF of English version of GB/T 37935-2019 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice.Question 2: Can I share the purchased PDF of GB/T 37935-2019_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 37935-2019_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GB/T 37935-2019 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.How to buy and download a true PDF of English version of GB/T 37935-2019?A step-by-step guide to download PDF of GB/T 37935-2019_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).Step 2: Search keyword "GB/T 37935-2019". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9 |